-
1
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
2
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan and A. Perrig, "Security and privacy in sensor networks," IEEE Computer, vol. 36, no. 10, pp. 103-105, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
3
-
-
84982899264
-
The role of trust management in distributed systems security
-
M. Blaze, J. Feigenbaum, and J. Ioannidis, "The role of trust management in distributed systems security," in Secure Internet Programming, Springer-Verlag, pp. 185-210, 1999.
-
(1999)
Secure Internet Programming, Springer-Verlag
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
-
6
-
-
0029700344
-
Decentralized trust management
-
May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
24944440539
-
A survey of trust and reputation systems for online service provision
-
A. Jsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," in Decision Support Systems, 2005.
-
(2005)
Decision Support Systems
-
-
Jsang, A.1
Ismail, R.2
Boyd, C.3
-
11
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
September
-
P. Michiardi and R. Molva, "Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Communication and Multimedia Security, September 2002.
-
(2002)
Communication and Multimedia Security
-
-
Michiardi, P.1
Molva, R.2
-
13
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Y. Sun, W. Yu, Z. Han, and K. J. Ray Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE JSAC special issue on security in wireless ad hoc networks, 2006.
-
(2006)
IEEE JSAC special issue on security in wireless ad hoc networks
-
-
Sun, Y.1
Yu, W.2
Han, Z.3
Ray Liu, K.J.4
-
14
-
-
84938436609
-
Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems
-
C. Dellarocas, "Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems," in Proceedings of ICIS, 2000.
-
(2000)
Proceedings of ICIS
-
-
Dellarocas, C.1
-
15
-
-
0141862713
-
-
MISRC Working Paper Series, Technical Report 94-04, arlson School of Management, University of Minnesota
-
D. H. McKnight and N. L. Chervany, "The meanings of trust," MISRC Working Paper Series, Technical Report 94-04, arlson School of Management, University of Minnesota, 1996.
-
(1996)
The meanings of trust
-
-
McKnight, D.H.1
Chervany, N.L.2
-
16
-
-
85080346761
-
-
D. Gambetta, Can we trust trust?, in in Gambella, Diego (ed.) Trust: Making and breaking cooperative relations, electronic edition. Department of Sociology, University of Oxford, pp. 213-237, 2000.
-
D. Gambetta, "Can we trust trust?," in in Gambella, Diego (ed.) Trust: Making and breaking cooperative relations, electronic edition. Department of Sociology, University of Oxford, pp. 213-237, 2000.
-
-
-
-
18
-
-
84947294004
-
Modelling a public-key infrastructure
-
Proceedings 1996 European Symposium on Research in Computer SecurityESORICS' 96, of
-
U. Maurer, "Modelling a public-key infrastructure," in Proceedings 1996 European Symposium on Research in Computer Security(ESORICS' 96), volume 1146 of Lecture Notes in Computer Science, pp. 325-350, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 325-350
-
-
Maurer, U.1
-
20
-
-
0002101577
-
Reputation systems
-
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation systems," Communications of the ACM, vol. 43, no. 12, pp. 45-48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
21
-
-
85080342218
-
-
D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks, mobile computing, In Moible Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, pp. 153-181, 1996.
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks, mobile computing," In Moible Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, pp. 153-181, 1996.
-
-
-
|