-
1
-
-
0003839495
-
Formalising trust as a computational concept
-
University of Stirling
-
S. Marsh, "Formalising Trust as a Computational Concept," in Department of Mathematics and Computer Science: University of Stirling, 1994.
-
(1994)
Department of Mathematics and Computer Science
-
-
Marsh, S.1
-
4
-
-
0001951820
-
Can we trust trust?
-
D. Gambetta, Ed.: Univ. of Oxford, pp. Ch 13
-
D. Gambetta, "Can we trust trust?," in Trust, Making and breaking cooperative relations, electronic edition, D. Gambetta, Ed.: Univ. of Oxford, 1988, pp. Ch 13, pp 213 - 237.
-
(1988)
Trust, Making and Breaking Cooperative Relations, Electronic Edition
, pp. 213-237
-
-
Gambetta, D.1
-
6
-
-
0001517093
-
On the attitude of trust
-
L. Hertzberg, "On the Attitude of Trust," Inquiry, vol. 31, pp. 319, 1988.
-
(1988)
Inquiry
, vol.31
, pp. 319
-
-
Hertzberg, L.1
-
7
-
-
2942662944
-
Simulation-based analysis of security exposures in mobile AdHoc networks
-
P. Michiardi and R. Molva, "Simulation-based Analysis of Security Exposures in Mobile AdHoc Networks," presented at the European Wireless Conference, 2002.
-
(2002)
European Wireless Conference
-
-
Michiardi, P.1
Molva, R.2
-
11
-
-
0002101577
-
Reputation systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, "Reputation Systems," Communications of the ACM, vol. 43, pp. 45 -48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
12
-
-
4544304744
-
The sybil attack
-
Cambridge, MA
-
J. Douceur, "The sybil attack," presented at IPTPS02 Workshop, Cambridge, MA, 2002.
-
(2002)
IPTPS02 Workshop
-
-
Douceur, J.1
-
14
-
-
9244265538
-
Network mobility and protocol interoperability in ad hoc networks
-
L. A. DaSilva, S. F. Midkiff, J. S. Park, G. C. Hadjichristofi, N. J. Davis, K. S. Phanse, and T. Lin, "Network mobility and protocol interoperability in ad hoc networks," Communications Magazine, IEEE, vol. 42, pp. 88-96, 2004.
-
(2004)
Communications Magazine, IEEE
, vol.42
, pp. 88-96
-
-
DaSilva, L.A.1
Midkiff, S.F.2
Park, J.S.3
Hadjichristofi, G.C.4
Davis, N.J.5
Phanse, K.S.6
Lin, T.7
-
16
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston MA
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," presented at 6th annual international conference on Mobile computing and networking, Boston MA, 2000.
-
(2000)
6th Annual International Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
18
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
S. Buchegger and J.-Y. Le Boudec, "Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks," presented at the 10th EuromicroWorkshop on Parallel, Distributed and Network-based Processing, 2002.
-
(2002)
10th EuromicroWorkshop on Parallel, Distributed and Network-based Processing
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
19
-
-
2642587068
-
Towards a framework for assessing trust-based admission control in collaborative Ad Hoc applications
-
Department of Computer Science, Trinity College Dublin, Dublin, IE
-
E. Gray, P. O'Connell, C. Jensen, S. Weber, J.-M. Seigneur, and C. Yong, "Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications," Department of Computer Science, Trinity College Dublin, Dublin, IE, Technical Report TD-2002-66, 2002.
-
(2002)
Technical Report
, vol.TD-2002-66
-
-
Gray, E.1
O'Connell, P.2
Jensen, C.3
Weber, S.4
Seigneur, J.-M.5
Yong, C.6
-
20
-
-
24744469215
-
A framework for key management in a mobile ad-hoc network
-
Las Vegas, NV
-
G. C. Hadjichristofi, W. J. Adams, and N. J. Davis, "A Framework for Key Management in a Mobile Ad-Hoc Network," presented at the International Conference on Information Technology Coding and Computing (ITCC 05), Las Vegas, NV, 2005.
-
(2005)
International Conference on Information Technology Coding and Computing (ITCC 05)
-
-
Hadjichristofi, G.C.1
Adams, W.J.2
Davis, N.J.3
-
22
-
-
28444452986
-
Calculating a node's reputation in a mobile ad-hoc network
-
Phoenix, AZ
-
W. J. Adams, G. C. Hadjichristofi, and N. J. Davis, "Calculating a Node's Reputation in a Mobile Ad-Hoc Network," presented at the 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), Phoenix, AZ, 2005.
-
(2005)
24th IEEE International Performance Computing and Communications Conference (IPCCC 2005)
-
-
Adams, W.J.1
Hadjichristofi, G.C.2
Davis, N.J.3
-
24
-
-
4544301639
-
Trust propagation in small worlds
-
E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen, "Trust propagation in small worlds," presented at the First International Conference on Trust Management (iTrust2003), 2003.
-
(2003)
First International Conference on Trust Management (ITrust2003)
-
-
Gray, E.1
Seigneur, J.-M.2
Chen, Y.3
Jensen, C.4
-
25
-
-
33745467423
-
A robust reputation system for mobile ad-hoc networks
-
S. Buchegger and J.-Y. Le Boudec, "A Robust Reputation System for Mobile Ad-Hoc Networks," EPFL 2003.
-
EPFL 2003
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
26
-
-
1642304571
-
Boundedly rational and emotional agents - Cooperation trust and rumor
-
C. Castelfranchi and Y.-H. Tan, Eds. Norwood, MA: Kluwer Academic Publisher
-
M. Prietula and K. Carley, "Boundedly rational and emotional agents - cooperation trust and rumor," in Trust and Deception in Virtual Societies, C. Castelfranchi and Y.-H. Tan, Eds. Norwood, MA: Kluwer Academic Publisher, 2001, pp. 169 - 193.
-
(2001)
Trust and Deception in Virtual Societies
, pp. 169-193
-
-
Prietula, M.1
Carley, K.2
-
27
-
-
33745472042
-
-
University of Cambridge, Cambridge, UK 2003
-
A. Fernandes, E. Kotsovinos, S. Ostring, and B. Dragovic, "Pinocchio: Incentives for honest participation In Global-Scale Distributed trust management," University of Cambridge, Cambridge, UK 2003 2003.
-
(2003)
Pinocchio: Incentives for Honest Participation in Global-Scale Distributed Trust Management
-
-
Fernandes, A.1
Kotsovinos, E.2
Ostring, S.3
Dragovic, B.4
-
28
-
-
33745453245
-
Sizing the credential cache in a trust-based access control system
-
submitted to St. Louis, MO
-
W. Adams, R. Thomas, and N. Davis, "Sizing the Credential Cache in a Trust-based Access Control System," submitted to IEEE Global Telecommunications Conference (GLOBECOM 2005), St. Louis, MO, 2005.
-
(2005)
IEEE Global Telecommunications Conference (GLOBECOM 2005)
-
-
Adams, W.1
Thomas, R.2
Davis, N.3
|