메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages 526-532

Cluster-based trust model against attacks in ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION TECHNOLOGY; METROPOLITAN AREA NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 57849094543     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCIT.2008.112     Document Type: Conference Paper
Times cited : (9)

References (12)
  • 1
    • 30144438433 scopus 로고    scopus 로고
    • Guest Editors' Introduction: Ad Hoc and P2P Security
    • Nov.-Dec
    • Shieh, S.W.; Wallach, D.S., "Guest Editors' Introduction: Ad Hoc and P2P Security," Internet Computing, IEEE, vol. 9, no. 6, pp. 14-15, Nov.-Dec. 2005
    • (2005) Internet Computing, IEEE , vol.9 , Issue.6 , pp. 14-15
    • Shieh, S.W.1    Wallach, D.S.2
  • 2
    • 24944461245 scopus 로고    scopus 로고
    • Sini Ruohomaa and Lea Kutvonen, Trust Management Survey, iTrust 2005, LNCS 3477, pp. 77-92, 2005.
    • Sini Ruohomaa and Lea Kutvonen, "Trust Management Survey", iTrust 2005, LNCS 3477, pp. 77-92, 2005.
  • 3
    • 84864863529 scopus 로고    scopus 로고
    • Yuhui Zhong and Bharat Bhargava, Authorization based on evidence and trust, DaWaK 2002, LNCS 2454, pp. 94-103, 2002.
    • Yuhui Zhong and Bharat Bhargava, "Authorization based on evidence and trust", DaWaK 2002, LNCS 2454, pp. 94-103, 2002.
  • 4
    • 24944455224 scopus 로고    scopus 로고
    • D. W. Chadwick, Operational Models for Reputation Servers, iTrust 2005, LNCS 3477, pp. 108-115, 2005.
    • D. W. Chadwick, "Operational Models for Reputation Servers", iTrust 2005, LNCS 3477, pp. 108-115, 2005.
  • 6
    • 57849146438 scopus 로고    scopus 로고
    • Gambetta, D.G., Can we trust trust? in D.G. Gambetta (Ed.), Trust, pp. 213-237, Basil Blackwell, New York, 1988.
    • Gambetta, D.G., "Can we trust trust?" in D.G. Gambetta (Ed.), Trust, pp. 213-237, Basil Blackwell, New York, 1988.
  • 7
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Feb
    • Yan Lindsay Sun, Wei Yu; Zhu Han and Liu, K.J.R., "Information theoretic framework of trust modeling and evaluation for ad hoc networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 305-317, Feb. 2006
    • (2006) Selected Areas in Communications, IEEE Journal on , vol.24 , Issue.2 , pp. 305-317
    • Yan, L.1    Yu, W.2    Han, Z.3    Liu, K.J.R.4
  • 9
    • 23844494215 scopus 로고    scopus 로고
    • Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network
    • August
    • Seunghun Jin, Chanil Park, Daeseon Choi, Kyoil Chung and Hyunsoo Yoon, "Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network", ETRI Journal, Volume 27, Number 4, August 2005.
    • (2005) ETRI Journal , vol.27 , Issue.4
    • Jin, S.1    Park, C.2    Choi, D.3    Chung, K.4    Yoon, H.5
  • 10
    • 57849143237 scopus 로고    scopus 로고
    • Trust-aware Decentralized Recommender Sytems: PhD research proposal
    • Technical Report#T04-06-07, Istituto Trentino di Cultura
    • Massa P., "Trust-aware Decentralized Recommender Sytems: PhD research proposal", Technical Report#T04-06-07, Istituto Trentino di Cultura, 2004.
    • (2004)
    • Massa, P.1
  • 11
    • 0036989477 scopus 로고    scopus 로고
    • Methods and Metrics for Cold-Start Recommendations
    • Finland, August
    • Andrew I. Schein, Alexandrin Popescul, Lyle H. Ungar, David M. Pennock, "Methods and Metrics for Cold-Start Recommendations", ACM SIGIR 2002, Finland, August, 2002.
    • (2002) ACM SIGIR
    • Schein, A.I.1    Popescul, A.2    Ungar, L.H.3    Pennock, D.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.