Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks
暂无分享,去创建一个
[1] P. Erdos,et al. On the evolution of random graphs , 1984 .
[2] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[3] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[4] Gabriel Montenegro,et al. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.
[5] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[6] Ivan Stojmenovic,et al. Handbook of Wireless Networks and Mobile Computing , 2002 .
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] A. Rbnyi. ON THE EVOLUTION OF RANDOM GRAPHS , 2001 .
[9] Yacine Challal,et al. NetTRUST: mixed NETworks Trust infrastRUcture baSed on Threshold cryptography , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[10] Siu-Ming Yiu,et al. Providing distributed certificate authority service in cluster-based mobile ad hoc networks , 2007, Comput. Commun..
[11] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[12] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[13] Patrick Th. Eugster,et al. DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for ad hoc networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[14] Taylor Yu. The Kerberos Network Authentication Service (Version 5) , 2007 .
[15] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[16] Mohan S. Kankanhalli,et al. Efficient and robust key management for large mobile ad hoc networks , 2005, Comput. Networks.
[17] Michael R. Lyu,et al. Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[18] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[19] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[20] Alice Bob,et al. The PGP Trust Model , 2005 .
[21] Abderrahim Benslimane,et al. Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[22] B. Bollobás. The evolution of random graphs , 1984 .
[23] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[24] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[25] Weihong Wang,et al. Self-managed heterogeneous certification in mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[26] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[27] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[28] Michael Roe,et al. Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.
[29] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[30] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[31] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[32] D. Toshniwal,et al. Dynamic Support for Distributed Certification Authority in Mobile Ad Hoc Networks , 2006, 2006 International Conference on Hybrid Information Technology.