Path Optimization Techniques for Trusted Routing in Tactical Mobile Ad-Hoc Networks
暂无分享,去创建一个
[1] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[2] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[3] G. Unter Rote. Path Problems in Graphs , 1989 .
[4] S. Verdú,et al. Abstract dynamic programming models under commutativity conditions , 1987 .
[5] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[6] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[7] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[8] Magdy S. El-Soudani,et al. A Survey on Trust and Reputation Schemes in Ad Hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[9] Yacov Y. Haimes,et al. Multiobjective Decision Making: Theory and Methodology , 1983 .
[10] Robert J. McEliece,et al. The generalized distributive law , 2000, IEEE Trans. Inf. Theory.
[11] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[12] Yacine Rebahi,et al. A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[13] Reijo Savola,et al. Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] A. Barrett. Network Flows and Monotropic Optimization. , 1984 .
[16] Michalis Faloutsos,et al. Routing amid Colluding Attackers , 2007, 2007 IEEE International Conference on Network Protocols.
[17] L. Lasdon,et al. On a bicriterion formation of the problems of integrated system identification and system optimization , 1971 .
[18] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.