-
1
-
-
37549055597
-
-
S. Buchegger, J.Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proceedings of WiOpt '03, March 2003.
-
-
-
-
2
-
-
37549026998
-
-
Camp Tracy, Boleng Jeff, Davies Vanessa, A survey of mobility models for ad hoc network research, Department of Mathematics and Computer Sciences, Colorado School of Mines, Golden, CO, September 2002. .
-
-
-
-
3
-
-
20344371959
-
-
Capra Licia, Engineering human trust in mobile system collaborations, in: Proceedings of the 12th International Symposium on the Foundations of Software Engineering, 2004, pp. 107-116.
-
-
-
-
4
-
-
4544374484
-
-
Cr'epeau, Claude, R. Davis Carlton, A certificate revocation scheme for wireless Ad hoc networks, in: 1st ACM workshop on Security of ad hoc and sensor networks, 2003, pp. 54-61.
-
-
-
-
5
-
-
0034776383
-
-
T. Goff, N.B. Abu-Ghazaleh, D.S. Phatak, R. Kahvecioglu, Preemptive routing in ad hoc networks, in: Proceedings of the ACM MobiCom, July 2001.
-
-
-
-
6
-
-
84883869163
-
-
Luo Haiyun, P. Zerfos, Kong Jiejun, Lu Songwu, Zhang Lixia, Self-securing ad hoc wireless networks, in: Proceedings IEEE Symposium on Computers and Communications, July 2002, pp 567-574.
-
-
-
-
7
-
-
0001341422
-
DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks
-
Perkins C.E. (Ed), Addison-Wesley
-
Johnson D.B., Maltz D.A., and Broch J. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins C.E. (Ed). Ad Hoc Networking (2001), Addison-Wesley 139-172
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
8
-
-
37549023215
-
-
Navid Nikaein, Mobile Ad Hoc Networking & Computing at Eurecom. , 2001.
-
-
-
-
9
-
-
77953097829
-
-
Rajiv K. Nekkanti, Chung-wei Lee, Trust based adaptive on demand ad hoc routing protocol, in: Proceedings of the 42nd ACM Southeast Regional Conference, 2004, pp. 88-93.
-
-
-
-
10
-
-
37549043336
-
-
Asad Amir Pirzada, Chris McDonald, Establishing trust in pure ad hoc networks, in: Proceedings of the 27th Conference on Australasian Computer Science, 2004, pp. 47-54.
-
-
-
-
11
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
Kui R., Li T., Wan Z., Bao F., Deng R.H., and Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45 (2004) 687-699
-
(2004)
Computer Networks
, vol.45
, pp. 687-699
-
-
Kui, R.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
12
-
-
37549047376
-
-
Szabo Nick, Shamir's secret sharing. , 1997.
-
-
-
-
13
-
-
11244333253
-
-
Theodorakopoulos George, John S. Baras, Trust evaluation in ad hoc networks, in: Proceedings of the ACM workshop on Wireless Security, 2004, pp. 1-10.
-
-
-
-
14
-
-
37549036080
-
-
Wang Yao, Bayesian network-based trust model in peer-to-peer networks, in: Proceedings Workshop on Deception, Fraud and Trust in Agent Societies, 2003.
-
-
-
-
15
-
-
37549023992
-
-
Zheng Yan, Peng Zhang, Trust evaluation based security solution in ad hoc networks, in: Proceedings of the Seventh Nordic Workshop on Secure IT Systems, 2003.
-
-
-
-
16
-
-
5044222209
-
-
Zhaoyu Liu, A.W. Joy, R.A. Thompson, A dynamic trust model for mobile ad hoc networks, in: Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, FTDCS 2004, 2004, pp. 80-85.
-
-
-
-
17
-
-
10044251395
-
Facilitating secure ad hoc service discovery in public environments
-
Zhu F., Mutka M., and Ni L. Facilitating secure ad hoc service discovery in public environments. Journal of Systems and Software 76 (2005) 45-54
-
(2005)
Journal of Systems and Software
, vol.76
, pp. 45-54
-
-
Zhu, F.1
Mutka, M.2
Ni, L.3
-
18
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
Lalana K., Tim F., and Anupam J. Trust-based security in pervasive computing environments. IEEE Computer 34 12 (2001) 154-157
-
(2001)
IEEE Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Lalana, K.1
Tim, F.2
Anupam, J.3
-
19
-
-
21644441634
-
-
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer, An intrusion detection tool for AODV-based ad hoc wireless networks, in: Proceedings of the 20th Annual Computer Security Applications Conference, 2004.
-
-
-
-
20
-
-
37548998782
-
-
J. Wright, Detecting Wireless LAN MAC Address Spoofing, White Paper, January 2003.
-
-
-
-
22
-
-
0042863413
-
Proactive seamless mobility management for future IP radio access networks
-
Pagtzis T., Kirstein P.T., Hailes S., and Afifi H. Proactive seamless mobility management for future IP radio access networks. Computer Communications 26 17 (2003) 1975-1989
-
(2003)
Computer Communications
, vol.26
, Issue.17
, pp. 1975-1989
-
-
Pagtzis, T.1
Kirstein, P.T.2
Hailes, S.3
Afifi, H.4
|