Uncertainty Modeling and Reduction in MANETs
暂无分享,去创建一个
[1] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[2] Vladimiro Sassone,et al. A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[3] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[4] Ellen W. Zegura,et al. Controlling the mobility of multiple data transport ferries in a delay-tolerant network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Audun Jøsang,et al. Exploring Different Types of Trust Propagation , 2006, iTrust.
[6] P.H.J. Chong,et al. A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[7] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[8] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[9] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[10] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[11] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[12] Sencun Zhu,et al. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.
[13] Donald F. Towsley,et al. Mobility improves coverage of sensor networks , 2005, MobiHoc '05.
[14] Audun Jøsang,et al. Normalising the Consensus Operator for Belief Fusion , 2006 .
[15] Jie Wu,et al. Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[16] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[17] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[18] Ellen W. Zegura,et al. A message ferrying approach for data delivery in sparse mobile ad hoc networks , 2004, MobiHoc '04.
[19] Jie Wu,et al. Survivable multi-level ad-hoc group operations , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[20] Jie Wu,et al. On calculating power-aware connected dominating sets for efficient routing in ad hoc wireless networks , 2001, Journal of Communications and Networks.
[21] Moti Yung,et al. Fourth-factor authentication: somebody you know , 2006, CCS '06.
[22] David Tse,et al. Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.
[23] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[24] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[25] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[26] Jie Wu,et al. Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[27] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[28] Robert A. Scholtz,et al. Performance Analysis of , 1998 .
[29] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[30] Jie Wu,et al. Mobility management and its applications in efficient broadcasting in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.