Trust Formalization in Mobile Ad-Hoc Networks
暂无分享,去创建一个
Abdul Sattar | Vallipuram Muthukkumarasamy | Raihana Ferdous | A. Sattar | Raihana Ferdous | V. Muthukkumarasamy
[1] Shambhu Upadhyaya,et al. Securing Information through Trust Management in Wireless Networks , 2004 .
[2] Dhiraj K. Pradhan,et al. A Cluster-based Approach for Routing in Ad-Hoc Networks , 1995, Symposium on Mobile and Location-Independent Computing.
[3] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[4] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[5] Todd Hughes,et al. Dynamic Trust Applied to Ad Hoc Network Resources , 2003 .
[6] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[7] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[8] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[9] M. Chandrasekaran,et al. Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..
[10] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[11] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[12] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[13] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[14] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[15] Carlton R. Davis. A localized trust management scheme for ad hoc networks , 2004 .
[16] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.