FROST: Friendship and Ordered Semirings Based Trust System for Securing Wireless Distributed Networks
暂无分享,去创建一个
[1] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[2] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[3] Paul Resnick,et al. Reputation systems , 2000, CACM.
[4] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[5] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[6] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[7] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[8] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[9] Shanshan Li,et al. A Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks , 2011, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks.
[10] Junhao Wen,et al. Web Service Selection Mechanism with QoS and Trust Management , 2011 .
[11] Ruidong Li,et al. On-demand public-key management for mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..
[12] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[13] Andrés Marín López,et al. Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[14] G. Rote. Path Problems in Graphs , 1990 .
[15] Huafeng Wu,et al. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .
[16] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[17] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[18] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.
[19] Chrysanthos Dellarocas,et al. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.
[20] M. Demir,et al. I am so Happy ’Cause Today I Found My Friend: Friendship and Personality as Predictors of Happiness , 2007 .
[21] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[22] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[23] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.