An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks
暂无分享,去创建一个
[1] Fillia Makedon,et al. Analysis of a low-dimensional linear model under recommendation attacks , 2006, SIGIR.
[2] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[3] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[4] Hung T. Nguyen,et al. Probability Updating Using Second Order Probabilities and Conditional Event Algebra , 1999, Inf. Sci..
[5] Yang Bo,et al. Using Trust Metric to Detect Malicious Behaviors in WSNs , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[6] Carles Sierra,et al. An information-based model for trust , 2005, AAMAS '05.
[7] Paolo Donzelli,et al. A unified model of dependability: capturing dependability in context , 2004, IEEE Software.
[8] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[9] Shichao Zhang,et al. Detecting Collusion Attacks in Security Protocols , 2006, APWeb.
[10] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[11] Alexander Aiken,et al. Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.
[12] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[13] Kay Römer,et al. The design space of wireless sensor networks , 2004, IEEE Wireless Communications.
[14] Daniel W. Manchala,et al. Trust metrics, models and protocols for electronic commerce transactions , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[15] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[16] W. Liu,et al. Trustworthy service selection and composition - reducing the entropy of service-oriented Web , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[17] Michael K. Reiter,et al. Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.