-
1
-
-
2942656255
-
Secure routing in sensor networks: Attacks and countermeasures
-
May
-
C. Karlof, D. Wagner. Secure routing in sensor networks: Attacks and countermeasures. Elsevier AdHoc Networks journal, May 2003.
-
(2003)
Elsevier AdHoc Networks Journal
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, September 2002.
-
(2002)
Wireless Networks Journal
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
5
-
-
14844319049
-
TinySec: Link layer encryption for tiny devices
-
To appear
-
C. Karlof, N. Sastry, D. Wagner. TinySec: Link Layer Encryption for Tiny Devices. To appear in ACM SenSys, 2004.
-
(2004)
ACM SenSys
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
6
-
-
4243199653
-
The performance evaluation of intrusion-tolerant routing in wireless sensor networks
-
April
-
J. Deng, R. Han and S. Mishra. The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In the Proceedings of IPSN, April, 2003.
-
(2003)
Proceedings of IPSN
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
7
-
-
14844304757
-
TinyPK: Securing sensor networks with public key technology
-
To appear
-
R. Watro, D. Kong, S. F. Cuti, C. Gardiner, C. Lynn, P. Kruus. TinyPK: Securing Sensor Networks with Public Key Technology. To appear in second workshop on Security in Sensor and Ad-hoc Networks, 2004.
-
(2004)
Second Workshop on Security in Sensor and Ad-hoc Networks
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
9
-
-
3543100577
-
Statistical en-route detection and filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, L. Zhang. Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks. In Proceedings of IEEE Infocom, 2004.
-
(2004)
Proceedings of IEEE Infocom
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
10
-
-
0038341106
-
A key management scheme for distributed sensor networks
-
November
-
L. Eschenauer, V. D. Gligor. A key Management Scheme for Distributed Sensor networks. In Proceedings of ACM CCS, November 2002.
-
(2002)
Proceedings of ACM CCS
-
-
Eschenauer, L.1
Gligor, V.D.2
-
12
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
October
-
D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of ACM CCS, October 2003.
-
(2003)
Proceedings of ACM CCS
-
-
Liu, D.1
Ning, P.2
-
13
-
-
0029700344
-
Decentralized trust management
-
Oakland, California, USA
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proceedings of IEEE Conf. Security and Privacy, 1996, Oakland, California, USA.
-
(1996)
Proceedings of IEEE Conf. Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
18
-
-
85113133621
-
CORE: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks
-
September
-
P. Michiardi, R. Molva. CORE: A COllaborative REputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks. Communication and Multimedia Security, September, 2002.
-
(2002)
Communication and Multimedia Security
-
-
Michiardi, P.1
Molva, R.2
-
19
-
-
84944078503
-
A reputation-based trust model for peerto-peer ecommerce communities
-
L. Xiong, L. Liu. A reputation-based trust model for peerto-peer ecommerce communities. IEEE conference on e-commerce, 2003.
-
(2003)
IEEE Conference on e-commerce
-
-
Xiong, L.1
Liu, L.2
-
20
-
-
14844335451
-
Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks
-
S. Buchegger, J. L. Boudec. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. EPFL technical report, 2003.
-
(2003)
EPFL Technical Report
-
-
Buchegger, S.1
Boudec, J.L.2
-
21
-
-
14844324732
-
A robust reputation system for P2P and mobile ad-hoc networks
-
Harvard University, Cambridge MA, U.S.A., June
-
S. Buchegger, J. L. Boudec. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Proceedings of P2PEcon 2004, Harvard University, Cambridge MA, U.S.A., June 2004.
-
(2004)
Proceedings of P2PEcon 2004
-
-
Buchegger, S.1
Boudec, J.L.2
-
22
-
-
84938436609
-
Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems
-
C. Dellarocas. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of ICIS, 2000.
-
(2000)
Proceedings of ICIS
-
-
Dellarocas, C.1
-
25
-
-
0002101577
-
Reputation systems: Facilitating trust in e-commerce systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, E. Friedman. Reputation systems: Facilitating trust in e-commerce systems. Communications of the ACM, 43(12): 45-48.
-
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
27
-
-
27944460553
-
A mathematical theory of evidence
-
G. Shafer. A mathematical theory of evidence. Princeton University, 1976.
-
(1976)
Princeton University
-
-
Shafer, G.1
|