메뉴 건너뛰기




Volumn 30, Issue 10, 2007, Pages 1853-1864

Mobile ad hoc secure routing protocol based on trust preserving

Author keywords

Ad Hoc networks; Identity authenticating; Moving characteristic; Secure routing; Trust evaluation

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; DATA MINING; FORMAL LANGUAGES;

EID: 36248975572     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (16)
  • 8
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc networks
    • Zhou L, Hass Z J. Securing Ad Hoc networks. IEEE Network, 1999, 13(6): 24-30
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Hass, Z.J.2
  • 9
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Srdjan Capkun, Levente Buttyan. Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2003, 2(1): 52-64
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2
  • 11
    • 0002863367 scopus 로고    scopus 로고
    • Valuation of trust in open networks
    • 3rd European Symposium on Research in Computer Security. Brighton, UK
    • Beth T, Borcherding, M Klein B. Valuation of trust in open networks//Proceedings of Computer Security-ESORICS'94. 3rd European Symposium on Research in Computer Security. Brighton, UK, 1999: 3-18
    • (1999) Proceedings of Computer Security-ESORICS'94 , pp. 3-18
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 14
    • 0242719010 scopus 로고    scopus 로고
    • Trust-Based decision making for electronic transactions
    • Yngstrom L. and Svensson T.(ed.), Kista: Stockholm University Press
    • Josong A. Trust-Based decision making for electronic transactions//Yngstrom L, Svensson T eds. Proceedings of the 4th Nordic Workshop on Secure Computer Systems. Kista: Stockholm University Press, 1999: 1-21
    • (1999) Proceedings of the 4th Nordic Workshop on Secure Computer Systems , pp. 1-21
    • Josong, A.1
  • 15
    • 36248986702 scopus 로고    scopus 로고
    • The research of mining quantitative association rules for intrusion detection system
    • in Chinese
    • Yu Feng, Wang Min, Gao Xiang. The research of mining quantitative association rules for intrusion detection system. Computer Applications and Software, 2006, 23(11): 52-53 (in Chinese)
    • (2006) Computer Applications and Software , vol.23 , Issue.11 , pp. 52-53
    • Yu, F.1    Wang, M.2    Gao, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.