A trust management scheme based on behavior feedback for opportunistic networks
暂无分享,去创建一个
Chen Xi | Ma Zhuo | Ma Jianfeng | Sun Liang
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] Marco Conti,et al. From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.
[3] Jörg Ott,et al. Working day movement model , 2008, MobilityModels '08.
[4] Chen Xi,et al. A Secure Routing Scheme for Opportunistic Networks Based on Identity-Based Encryption , 2011 .
[5] Pan Hui,et al. BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.
[6] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[7] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[8] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Refik Molva,et al. Bootstrapping security associations in opportunistic networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[11] Pan Hui,et al. Haggle: A networking architecture designed around mobile users , 2006 .
[12] S. Keshav,et al. Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[13] Zhensheng Zhang,et al. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.
[14] Jörg Ott,et al. The ONE simulator for DTN protocol evaluation , 2009, SIMUTools 2009.
[15] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[16] Mohan Kumar,et al. Opportunities in Opportunistic Computing , 2010, Computer.
[17] Marco Conti,et al. HiBOp: a History Based Routing Protocol for Opportunistic Networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[18] Marco Conti,et al. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.
[19] Adi Shamir,et al. How to share a secret , 1979, CACM.
[20] Franck Legendre,et al. Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[21] Franck Legendre,et al. Trust in Opportunistic Networks , 2009 .
[22] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[23] Pietro Liò,et al. Social Networking for Pervasive Adaptation , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[24] Refik Molva,et al. Privacy in context-based and epidemic forwarding , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[25] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[26] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[27] Per Johansson,et al. Wireless ad hoc networking—The art of networking without a network , 2000 .
[28] Aniket Kate,et al. Anonymity and security in delay tolerant networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.