메뉴 건너뛰기




Volumn 3, Issue , 2005, Pages 1862-1867

Trust modeling and evaluation in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; AXIOMS; INFORMATION THEORETIC FRAMEWORK; TRUST MODELS;

EID: 33846602719     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2005.1577971     Document Type: Conference Paper
Times cited : (52)

References (18)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec
    • L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 2
    • 0000328529 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • August
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of MobiCom 2000, August 2000, p. 255265.
    • (2000) Proceedings of MobiCom 2000 , pp. 255265
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 3
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Sep
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of MobiCom 2002, Sep 2002.
    • (2002) Proceedings of MobiCom 2002
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 4
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path independence
    • December
    • M. K. Reiter and S. G. Stubblebine, "Resilient authentication using path independence," IEEE Transactions on Computers, vol. 47, no. 12, pp. 1351-1362, December 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.12 , pp. 1351-1362
    • Reiter, M.K.1    Stubblebine, S.G.2
  • 6
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Proceedings 1996 European Symposium on Research in Computer SecurityESORICS' 96, of
    • U. Maurer, "Modelling a public-key infrastructure," in Proceedings 1996 European Symposium on Research in Computer Security(ESORICS' 96), volume 1146 of Lecture Notes in Computer Science, 1996, pp. 325-350.
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 325-350
    • Maurer, U.1
  • 17
    • 25844465866 scopus 로고    scopus 로고
    • HADOF: Defense against routing disruptions in mobile ad hoc networks
    • March
    • Wei Yu, Yan Sun, and K.J. Ray Liu, "HADOF: Defense against routing disruptions in mobile ad hoc networks," in Proceedings of IEEE INFOCOM'05, March 2005.
    • (2005) Proceedings of IEEE INFOCOM'05
    • Yu, W.1    Sun, Y.2    Ray Liu, K.J.3
  • 18
    • 33846579442 scopus 로고    scopus 로고
    • D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks, mobile computing, In Moible Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, pp. 153-181, 1996.
    • D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks, mobile computing," In Moible Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, pp. 153-181, 1996.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.