Efficient Distribution of Trust Authority Functions in Tactical Networks
暂无分享,去创建一个
[1] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[2] Xiang-Yang Li,et al. Distributed low-cost backbone formation for wireless ad hoc networks , 2005, MobiHoc '05.
[3] Anthony Ephremides,et al. The Design and Simulation of a Mobile Radio Network with Distributed Control , 1984, IEEE J. Sel. Areas Commun..
[4] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[5] Sean W. Smith,et al. Modeling Public Key Infrastructures in the Real World , 2005, EuroPKI.
[6] Kemal Bicakci,et al. How to incorporate revocation status information into the trust metrics for public-key certification , 2005, SAC '05.
[7] Ravi Prakash,et al. Max-min d-cluster formation in wireless ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[8] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Ling Liu,et al. Building Trust in Decentralized Peer-to-Peer Electronic Communities , 2002 .
[10] Robbert van Renesse,et al. MISTRAL: efficient flooding in mobile ad-hoc networks , 2006, MobiHoc '06.
[11] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.
[12] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] Germano Caronni,et al. Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[14] Ueli Maurer,et al. Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence , 2000, Public Key Cryptography.
[15] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[16] R. Lombardi,et al. An instrument for the characterization of voltage and temperature profile in NiCd and NiMH batteries , 1997, Proceedings 23rd Euromicro Conference New Frontiers of Information Technology - Short Contributions -.
[17] Feipei Lai,et al. SWARM: Secure Wireless Ad-hoc network Reliance Management , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[18] Stefan Appel. Lokalisierung von Knoten in mobilen Ad-hoc-Netzen ohne zusätzliche Infrastruktur , 2006 .
[19] Mario Gerla,et al. Efficient flooding with Passive Clustering (PC) in ad hoc networks , 2002, CCRV.
[20] Kemal Ertugrul Tepe,et al. A high performance cluster-based broadcasting algorithm for wireless ad hoc networks based on a novel gateway selection approach , 2005, PE-WASUN '05.
[21] M. Chandrasekaran,et al. Quantifying trust in mobile ad-hoc networks , 2005, International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005..
[22] Zongpeng Li,et al. Probabilistic Power Management for Wireless Ad Hoc Networks , 2005, Mob. Networks Appl..
[23] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[24] Imrich Chlamtac,et al. An Energy-Efficient Method for Nodes Assignment in Cluster-Based Ad Hoc Networks , 2004, Wirel. Networks.