-
1
-
-
33846988153
-
-
A. Jøsang, The right type of trust for distributed systems, in Proc. ACM New Security Paradigms Wksp., Sept. '96
-
A. Jøsang, "The right type of trust for distributed systems," in Proc. ACM New Security Paradigms Wksp., Sept. '96
-
-
-
-
2
-
-
33846978999
-
-
F. Stajano, and R. Anderson, The Resurrecting Duckling: security issues for ad-hoc wireless networks, in Proc. 7th Intl. Wksp. on Security Protocols, '99
-
F. Stajano, and R. Anderson, "The Resurrecting Duckling: security issues for ad-hoc wireless networks", in Proc. 7th Intl. Wksp. on Security Protocols, '99
-
-
-
-
4
-
-
33847005665
-
-
th IFIP Commun, and Multimedia Security Conf., Sept. '02
-
th IFIP Commun, and Multimedia Security Conf., Sept. '02
-
-
-
-
5
-
-
4544283175
-
-
Q. He, D. Wu and P. Khosla, SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks, in Proc. IEEE WCNC2004, Mar. '04
-
Q. He, D. Wu and P. Khosla, "SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks", in Proc. IEEE WCNC2004, Mar. '04
-
-
-
-
7
-
-
33846961682
-
-
S. Bansal and M. Baker. Observation-Based Cooperation Enforcement in Ad-hoc Networks, Techical Report, Stanford University, '03
-
S. Bansal and M. Baker. "Observation-Based Cooperation Enforcement in Ad-hoc Networks", Techical Report, Stanford University, '03
-
-
-
-
8
-
-
33846991156
-
-
P. Dewan, et. al, On Using Reputations in Ad hoc Networks to Counter Malicious Nodes, in Proc. QoS and Dynamic Systems, Jul. '04
-
P. Dewan, et. al, "On Using Reputations in Ad hoc Networks to Counter Malicious Nodes", in Proc. QoS and Dynamic Systems, Jul. '04
-
-
-
-
9
-
-
0042933944
-
-
S. Zhong, J. Chen and R. Yang, Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad-hoc Networks, in Proc. IEEE INFOCOM2003, Apr. '03
-
S. Zhong, J. Chen and R. Yang, "Sprite: A Simple, Cheat-proof, Credit-based System for Mobile Ad-hoc Networks", in Proc. IEEE INFOCOM2003, Apr. '03
-
-
-
-
10
-
-
33846952035
-
-
L. Anderegg and S. Eidenbenz, Ad-hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad-hoc networks with selfish agents, in Proc. 9th Annual Intl. Conf. on Mobile Computing and Net., Sept. '03
-
L. Anderegg and S. Eidenbenz, "Ad-hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad-hoc networks with selfish agents", in Proc. 9th Annual Intl. Conf. on Mobile Computing and Net., Sept. '03
-
-
-
-
11
-
-
33846948854
-
-
A. Rahman and S. Hailes, A Distributed Trust Model, in Proc. New Security Paradigms Wksp., Sept. '97
-
A. Rahman and S. Hailes, "A Distributed Trust Model", in Proc. New Security Paradigms Wksp., Sept. '97
-
-
-
-
12
-
-
33846951385
-
-
T. Beth, M. Borchedring, and B. Klein, Valuation of Trust in Open Networks, in Proc. European Symp. on Research in Computer Security, Nov. '94
-
T. Beth, M. Borchedring, and B. Klein, "Valuation of Trust in Open Networks", in Proc. European Symp. on Research in Computer Security, Nov. '94
-
-
-
-
13
-
-
33846983167
-
-
B. Lamparter, M. Plaggemeier, and D. Westhoff, Analysis of cooperation approaches in ad hoc networks, in Proc. WiOpt03 Poster Session, Mar. '03
-
B. Lamparter, M. Plaggemeier, and D. Westhoff, "Analysis of cooperation approaches in ad hoc networks", in Proc. WiOpt03 Poster Session, Mar. '03
-
-
-
-
14
-
-
33846953435
-
-
_., Estimating the value of co-operation approaches for multihop ad hoc networks, Elsevier Journal of Ad Hoc Networks, Jan. '04
-
_., "Estimating the value of co-operation approaches for multihop ad hoc networks", Elsevier Journal of Ad Hoc Networks, Jan. '04
-
-
-
|