Trust-based security for wireless ad hoc and sensor networks
暂无分享,去创建一个
[1] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[2] Xiaoyan Hong,et al. Landmark routing in ad hoc networks with mobile backbones , 2003, J. Parallel Distributed Comput..
[3] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[4] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[5] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[6] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[7] B. Misztal. Trust in Modern Societies: The Search for the Bases of Social Order , 1996 .
[8] André Schiper,et al. Modeling fault-tolerant mobile agent execution as a sequence of agreement problems , 2000, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000.
[9] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[10] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[11] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[12] Muthucumaru Maheswaran,et al. Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[13] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[14] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[15] Keith Marzullo,et al. Tradeoffs in implementing primary-backup protocols , 1995, Proceedings.Seventh IEEE Symposium on Parallel and Distributed Processing.
[16] David J. Scott,et al. Spatial Security Policies for Mobile Agents in a Sentient Computing Environment , 2003, FASE.
[17] Mario Gerla,et al. Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.
[18] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[20] Diego Gambetta. Can We Trust Trust , 2000 .
[21] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[22] Akihiko Ohsuga,et al. Mobile agent security with the IPEditor development tool and the mobile UNITY language , 2001, AGENTS '01.
[23] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[24] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[25] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[26] Boi Faltings,et al. An incentive compatible reputation mechanism , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[27] Luís Valente,et al. Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.
[28] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[29] P. Dewan,et al. Securing P2P networks using peer reputations: is there a silver bullet? , 2005, Second IEEE Consumer Communications and Networking Conference, 2005. CCNC. 2005.
[30] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[31] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[32] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[33] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[34] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[35] Ninghui Li,et al. RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[36] Markus Straßer,et al. A fault-tolerant protocol for providing the exactly-once property of mobile agents , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[37] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[38] George D. Stamoulis,et al. Effective use of reputation in peer-to-peer environments , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[39] L. Mui,et al. A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[40] Fred B. Schneider,et al. Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.
[41] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.
[42] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[43] Lik Mui,et al. A Computational Model of Trust and Reputation for E-businesses , 2002 .
[44] Kaizar Amin,et al. Reputation-Based Grid Resource Selectionpdfauthor , 2003 .
[45] Samir Khuller,et al. A clustering scheme for hierarchical control in multi-hop wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[46] Victor S. Grishchenko,et al. A fuzzy model for context-dependent reputation , 2004, Trust@ISWC.