-
1
-
-
14844315770
-
-
S. Ganeriwal and M. Sri vasta va. Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pp. 66-77,Oct 2004.
-
S. Ganeriwal and M. Sri vasta va. "Reputation-based framework for high integrity sensor networks." In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pp. 66-77,Oct 2004.
-
-
-
-
2
-
-
36949013183
-
-
A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: Distributed Reputationbased Beacon Trust System. In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA, 2006.
-
A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: "Distributed Reputationbased Beacon Trust System". In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA, 2006.
-
-
-
-
3
-
-
0029700344
-
Decentralized trust management
-
May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
84938436609
-
Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems
-
C. Dellarocas, "Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems," in Proceedings of ICIS, 2000.
-
(2000)
Proceedings of ICIS
-
-
Dellarocas, C.1
-
8
-
-
33847097895
-
A New Kind of Session Keys Based on Message Scheme for Sensor Networks
-
China, Dec. 4-7
-
Haiguang Chen, Peng Han, Bo Yu, Chuanshan Gao "A New Kind of Session Keys Based on Message Scheme for Sensor Networks". The Seventeenth Asia Pacific Microwave Conference (APMC 2005) Suzhou , China , Dec. 4-7, 2005
-
(2005)
The Seventeenth Asia Pacific Microwave Conference (APMC 2005) Suzhou
-
-
Chen, H.1
Han, P.2
Yu, B.3
Gao, C.4
-
9
-
-
26444574670
-
-
November
-
C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), pages 162-175, November 2004
-
(2004)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
10
-
-
0036738266
-
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, D. Tygar.SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal, September 2002.
-
(2002)
SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
11
-
-
4243199653
-
The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
-
In the, April
-
J. Deng, R. Han and S. Mishra. The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. In the Proceedings of IPSN, April, 2003.
-
(2003)
Proceedings of IPSN
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
12
-
-
35148858979
-
-
S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004.
-
S. Ganeriwal, R. Kumar, C. C. Han. S. Lee, M. B. Srivastava. Location & Identity based Secure Event Report Generation for Sensor Networks. NESL Techanical Report, May 2004.
-
-
-
-
13
-
-
35148837270
-
-
Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao. Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. PAISI 2007 LNCS 4430, pp. 106-116.
-
Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao. Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. PAISI 2007 LNCS 4430, pp. 106-116.
-
-
-
-
15
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.C. Hu, A. Perrig, and D. B. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in Proc of IEEE Infocomm 2003.
-
(2003)
Proc of IEEE Infocomm
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
34547637688
-
-
November
-
P. Resnick and R. Zeckhauser, Trust Among Strangers in Internet Transactions: Empirical Anlysis of Ebay's Reputation System, Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce,vol. 11 ,pages 127-157,November 2002.
-
(2002)
Trust Among Strangers in Internet Transactions: Empirical Anlysis of Ebay's Reputation System, Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce
, vol.11
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
17
-
-
35148831336
-
-
S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks). Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.
-
S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes- Fairness In Dynamic Ad-hoc NeTworks). Proceedings of MobiHoc 2002, Lausanne, CH, June 2002.
-
-
-
-
18
-
-
36949013183
-
-
A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: Distributed Reputationbased Beacon Trust System. In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA, 2006.
-
A. Srinivasan, J. Teitelbaum and J. Wu. DRBTS: Distributed Reputationbased Beacon Trust System. In the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), Indianapolis, USA, 2006.
-
-
-
|