-
1
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
S. Kamvar, M. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proc of WWW, pages 640-651, 2003.
-
(2003)
, pp. 640-651
-
-
Kamvar, S.1
Schlosser, M.2
Garcia-Molina, H.3
-
3
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Y. Sun, Z. Han, W. Yu, and K. Liu. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proc of the IEEE INFOCOM, 2006.
-
(2006)
Proc of the IEEE INFOCOM
-
-
Sun, Y.1
Han, Z.2
Yu, W.3
Liu, K.4
-
5
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
S. Ganeriwal and M. Srivastava. Reputation-based framework for high integrity sensor networks. In Proc of the ACM SASN, pages 66-77, 2004.
-
(2004)
Proc of the ACM SASN
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.2
-
6
-
-
0242696192
-
Performance analysis of the confidant protocol
-
S. Buchegger and J. Boudec. Performance analysis of the confidant protocol. In Proc of MobiHoc, pages 226-236, 2002.
-
(2002)
Proc of MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.2
-
7
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Communications and Multimedia Security, pages 107-121, 2002.
-
(2002)
Communications and Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
8
-
-
34548370801
-
Observation-based cooperation enforcement in ad hoc networks
-
cs.NI/0307012
-
S. Bansal and M. Baker. Observation-based cooperation enforcement in ad hoc networks. CoRR, cs.NI/0307012, 2003.
-
(2003)
CoRR
-
-
Bansal, S.1
Baker, M.2
-
12
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
T. Camp, J. Boleng, and V Davies. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing, 2(5):483-502, 2002.
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
16
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
W. Zhang, H. Song, S. Zhu, and G. Cao. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In Proc of MobiHoc, pages 378-389, 2005.
-
(2005)
Proc of MobiHoc
, pp. 378-389
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
17
-
-
4444277059
-
A message ferrying approach for data delivery in sparse mobile ad hoc networks
-
W. Zhao, M. Ammar, and E. Zegura. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In Proc of the ACM MobiHoc, pages 187-198, 2004.
-
(2004)
Proc of the ACM MobiHoc
, pp. 187-198
-
-
Zhao, W.1
Ammar, M.2
Zegura, E.3
-
18
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proc of IPSN, pages 259-268, 2004.
-
(2004)
Proc of IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
|