메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2904-2908

Quantifying trust metrics of recommendation systems in ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BOOLEAN ALGEBRA; COMPUTATIONAL METHODS; RELIABILITY THEORY; SECURITY OF DATA; STATIC ANALYSIS;

EID: 36348961451     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2007.538     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 1
    • 36348993560 scopus 로고    scopus 로고
    • Public key infrastructure
    • Alfred W. Arsenault, Sean Turner. Public key infrastructure, http://www.ietf.org/ html.charters/pkix-charter.html.
    • Arsenault, Sean Turner
    • Alfred, W.1
  • 2
    • 20344402499 scopus 로고    scopus 로고
    • Towards a Survivable Security Architecture for Ad-Hoc Networks
    • Workshop
    • T.Aura, S.Maki: Towards a Survivable Security Architecture for Ad-Hoc Networks. Security Protocols Workshop 2001: 63-73.
    • (2001) Security Protocols , pp. 63-73
    • Aura, T.1    Maki, S.2
  • 3
    • 0031641091 scopus 로고    scopus 로고
    • On the Structure of Delegation
    • Tuomas Aura: On the Structure of Delegation Networks. CSFW 1998: 14-26.
    • Networks , vol.CSFW 1998 , pp. 14-26
    • Tuomas Aura1
  • 5
    • 84982994153 scopus 로고    scopus 로고
    • Distributed Access-Rights Managements with Delegations Certificates
    • T.Aura: Distributed Access-Rights Managements with Delegations Certificates. Secure Internet Programming 1999: 211-235.
    • (1999) Secure Internet Programming , pp. 211-235
    • Aura, T.1
  • 6
    • 36349030110 scopus 로고    scopus 로고
    • T.Beth, M.Borcherding and B.Klein: Valuation of Trust in Open Networks. ESORICS 1994: 3-18.
    • T.Beth, M.Borcherding and B.Klein: Valuation of Trust in Open Networks. ESORICS 1994: 3-18.
  • 7
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust Management for Public-Key Infrastructures. Security ProtocolsWorkshop
    • M.Blaze, J.Feigenbaum, A.D.Keromytis: KeyNote: Trust Management for Public-Key Infrastructures. Security ProtocolsWorkshop 1998: 59-63.
    • (1998) , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 9
    • 84958048748 scopus 로고    scopus 로고
    • Compliance Checking in the Policy Maker Trust Management System
    • M.Blaze, J.Feigenbaum and M.Strauss: Compliance Checking in the Policy Maker Trust Management System. Financial Cryptography 1998: 254-274.
    • (1998) Financial Cryptography , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 10
    • 84958235938 scopus 로고    scopus 로고
    • M.Blaze, J.Ioannidis, A.D.Keromytis: Trust management for IPsec. TISSEC 5(2): 95-118 (2002).
    • M.Blaze, J.Ioannidis, A.D.Keromytis: Trust management for IPsec. TISSEC 5(2): 95-118 (2002).
  • 11
    • 36349018694 scopus 로고    scopus 로고
    • J. A. Golbeck. Computing and applying trust in web-based social networks, University of Maryland, College Park, Ph.d Dissertation 2005.
    • J. A. Golbeck. Computing and applying trust in web-based social networks, University of Maryland, College Park, Ph.d Dissertation 2005.
  • 12
    • 84947294004 scopus 로고    scopus 로고
    • U.Maurer: Modelling a Public-Key Infrastructure. ESORICS 1996: 325-350.
    • U.Maurer: Modelling a Public-Key Infrastructure. ESORICS 1996: 325-350.
  • 13
    • 5044238739 scopus 로고    scopus 로고
    • Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile ad-hoc Networks
    • P.Michiardi, and R.Molva. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile ad-hoc Networks. In Proc. of CMS'02.
    • Proc. of CMS'02
    • Michiardi, P.1    Molva, R.2
  • 14
    • 4444276583 scopus 로고    scopus 로고
    • A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile ad-hoc Networks
    • P.Michiardi, and R. Molva. A Game Theoretical Approach to Evaluate Cooperation Enforcement Mechanisms in Mobile ad-hoc Networks. In Proc. of WiOpt03 of the IEEE Computer Society.
    • Proc. of WiOpt03 of the IEEE Computer Society
    • Michiardi, P.1    Molva, R.2
  • 16
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path in- dependence
    • December
    • M.Reiter and S.Stubblebine. Resilient authentication using path in- dependence. IEEE Transactions on computers, Vol.47, No. 12, December 1998.
    • (1998) IEEE Transactions on computers , vol.47 , Issue.12
    • Reiter, M.1    Stubblebine, S.2
  • 17
    • 39049116456 scopus 로고    scopus 로고
    • A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks
    • Barcelona, April
    • Y.Sun, Z.Han, WYu and K.Liu: A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. IEEE INFOCOM'06, Barcelona, April 2006.
    • (2006) IEEE INFOCOM'06
    • Sun, Y.1    Han, Z.2    WYu3    Liu, K.4
  • 19
    • 85026748110 scopus 로고
    • Probabilistic Computations: Toward a Unified Measure of Complexity (Extended Abstract)
    • A.C.Yao: Probabilistic Computations: Toward a Unified Measure of Complexity (Extended Abstract) FOCS 1977: 222-227.
    • (1977) FOCS , pp. 222-227
    • Yao, A.C.1
  • 20
    • 0028675688 scopus 로고
    • Trust-Based Navigation in Distribution Systems
    • R.Yahalom, B.Klein and T.Beth: Trust-Based Navigation in Distribution Systems. Computing Systems 7(1): 45-73, 1994.
    • (1994) Computing Systems , vol.7 , Issue.1 , pp. 45-73
    • Yahalom, R.1    Klein, B.2    Beth, T.3
  • 21
    • 46749113053 scopus 로고
    • Pretty Good Privacy (PGP), PGP User's Guide
    • October
    • P.Zimmermann. Pretty Good Privacy (PGP), PGP User's Guide, MIT, October, 1994.
    • (1994) MIT
    • Zimmermann, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.