-
2
-
-
4143104126
-
Sensor networks: An overview
-
DOI 10.1109/MP.2003.1197877
-
M. Tubaishat and S. Madria, "Sensor Networks: An Overview," IEEE Potentials, Vol.22 pp.20-23, Apr. 2003. (Pubitemid 44208080)
-
(2003)
IEEE Potentials
, vol.22
, Issue.2
, pp. 20-23
-
-
Tubaishat, M.1
Madria, S.2
-
3
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
DOI 10.1002/wcm.72
-
T. Camp, J. Boleng and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Communications & Mobile Computing,Vol.2, No. 5, pp.483-502, Aug. 2002. (Pubitemid 135713186)
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
4
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
H. Yang, H. Luo, F. Ye, S. Lu and L. Zhang; "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, Vol.11, Issue 1, pp.38-47, Feb. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
5
-
-
33749070588
-
Secure ad hoc networking
-
DOI 10.1109/CCNC.2006.1592978, 1592978, 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006
-
P. Papadimitratos, "Secure Ad Hoc Networking," IEEE Consumer Communications and Networking Conference, Vol.1, pp.10-14, Jan. 2006. (Pubitemid 44460341)
-
(2006)
2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006
, vol.1
, pp. 10-14
-
-
Papadimitratos, P.1
-
6
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
A.Mishra, K. Nadkarni and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks," IEEE Wireless Communications, Vol.11, Issue 1, pp.48-60, Feb. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
7
-
-
33744915525
-
Trust establishment in pure ad-hoc networks
-
DOI 10.1007/s11277-006-1574-5
-
A.A. Pirzada and C. McDonald, "Trust Establishment in Pure Ad-hoc Networks," Wireless Personal Communications, Vol.37, pp.139-168, Apr. 2006. (Pubitemid 43847195)
-
(2006)
Wireless Personal Communications
, vol.37
, Issue.1-2
, pp. 139-168
-
-
Pirzada, A.A.1
McDonald, C.2
-
8
-
-
29844454971
-
A secure ad-hoc routing approach using localized self-healing communities
-
DOI 10.1145/1062689.1062722, MOBIHOC 2005: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu and M. Gerla, "Routing 1: A secure Ad-hoc Routing Approach Using Localized Self-healing Communities," ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp.254-265, May 2005. (Pubitemid 43037601)
-
(2005)
Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 254-265
-
-
Kong, J.1
Hong, X.2
Yi, Y.3
Park, J.-S.4
Liu, J.5
Gerla, M.6
-
9
-
-
34247350837
-
Assessing vulnerabilities: Modeling ad-hoc rushing attack in a negligibility-based security framework
-
J. Kong, X. Hong and M. Gerla, "Assessing Vulnerabilities: Modeling Ad-hoc Rushing attack in A Negligibility-based Security Framework," ACM Workshop on Wireless Security, pp.55-64, Sep. 2006.
-
(2006)
ACM Workshop on Wireless Security
, pp. 55-64
-
-
Kong, J.1
Hong, X.2
Gerla, M.3
-
10
-
-
0842289248
-
Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
-
R. Mahalingam and N. Menon, "Pre-loaded Key Based Multicast and Broadcast Authentication in Mobile Ad-hoc Networks," IEEE Global Telecommunications Conference 2003, Vol.3, pp. 1405-1409, Dec. 2003.
-
(2003)
IEEE Global Telecommunications Conference 2003
, vol.3
, pp. 1405-1409
-
-
Mahalingam, R.1
Menon, N.2
-
11
-
-
21644478900
-
Secure multicast model for ad-hoc military networks
-
Proceedings - 2004 12th IEEE International Conference on Networks, ICON 2004 - Unity in Diversity
-
M. Choudhary, P. Sharma and D. Sanghi, "Secure Multicast Model for Ad-hoc Military Networks," The 12th IEEE International Conference on Networks, Vol.2, pp. 683-688, Nov. 2004. (Pubitemid 40926561)
-
(2004)
Proceedings - IEEE International Conference on Networks, ICON
, vol.2
, pp. 683-688
-
-
Choudhary, M.1
Sharma, P.2
Sanghi, D.3
-
12
-
-
66149127961
-
-
PKIX Working Group, draft-ietf-pkix-rfc3280bis-08.txt
-
PKIX Working Group, "Internet X.509 Public Key Infrastructure," draft-ietf-pkix-rfc3280bis-08.txt, 2007.
-
(2007)
Internet X.509 Public Key Infrastructure
-
-
-
13
-
-
0003899818
-
The kerberos network authentication service (version 5)
-
C. Neuman, T. Yu, S. Hartman and K. Raeburn, "The Kerberos Network Authentication Service (version 5)," RFC 4120, July 2005.
-
(2005)
RFC 4120
-
-
Neuman, C.1
Yu, T.2
Hartman, S.3
Raeburn, K.4
-
16
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jsang, R. Ismail and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems, Vol.43, No.2, pp. 618-644, Mar. 2005.
-
(2005)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jsang, A.1
Ismail, R.2
Boyd, C.3
-
17
-
-
34547421426
-
The index poisoning attack in P2P file sharing systems
-
DOI 10.1109/INFOCOM.2006.232, Proceedings - INFOCOM 2006: 25th IEEE International Conference on Computer Communications
-
J. Liang, N. Naoumov and K.W. Ross, "The Index Poisoning Attack in P2P File-Sharing Systems," IEEE Infocom, pp.1-12, Apr. 2006. (Pubitemid 351240418)
-
(2006)
Proceedings - IEEE INFOCOM
, pp. 4146885
-
-
Liang, J.1
Naoumov, N.2
Ross, K.W.3
-
20
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," IFIP TC6/TC11 6th CCMS'02, pp.107-121, Sep. 2002.
-
(2002)
IFIP TC6/TC11 6th CCMS'02
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
22
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
DOI 10.1109/JSAC.2005.861389
-
Y. Sun, W. Yu, Z. Han and K.J. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, Vol.24, pp.305-317, Feb. 2006. (Pubitemid 43269751)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-315
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
-
23
-
-
0001951820
-
Trust: Making and breaking cooperative relations
-
chapter 13
-
D. Gambetta, "Trust: Making and Breaking Cooperative Relations," Basil Blackwell, chapter 13, pp.213-237, 1988.
-
(1988)
Basil Blackwell
, pp. 213-237
-
-
Gambetta, D.1
-
24
-
-
34247093189
-
Architectural support for trust models in decentralized applications
-
Proceeding of the 28th International Conference on Software Engineering 2006, ICSE '06
-
G. Suryanarayana, M.H. Diallo, J.R. Erenkrantz and R.N. Taylor "Architectural support for trust models in decentralized applications," The 28th International Conference on Software Engineering, pp.52-61, May 2006. (Pubitemid 46600902)
-
(2006)
Proceedings - International Conference on Software Engineering
, vol.2006
, pp. 52-61
-
-
Suryanarayana, G.1
Diallo, M.H.2
Erenkrantz, J.R.3
Taylor, R.N.4
-
26
-
-
33751041485
-
BambooTrust: Practical scalable trust management for global public computing
-
Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
-
E. Kotsovinos, A. Williams, "BambooTrust: Practical Scalable Trust Management for Global Public Computing," ACM Symposium on Applied Computing, pp.1893 - 1897, Apr. 2006. (Pubitemid 44759114)
-
(2006)
Proceedings of the ACM Symposium on Applied Computing
, vol.2
, pp. 1893-1897
-
-
Kotsovinos, E.1
Williams, A.2
-
27
-
-
0034309383
-
Trust management through reputation mechanisms
-
DOI 10.1080/08839510050144868
-
G. Zacharia and Pattie Maes, "Trust Management through Reputation Mechanisms," Applied Artificial Intelligence, Vol.14, Issue 9, pp.881-907, Oct. 2000. (Pubitemid 35394323)
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.9
, pp. 881-907
-
-
Zacharia, G.1
Maes, P.2
-
28
-
-
0242696192
-
Performance analysis of the confidant protocol: Cooperation of nodes - fairness in dynamic ad hoc networks
-
S. Buchegger and J.Y.L. Boudec, "Performance Analysis of the Confidant Protocol: Cooperation of Nodes - Fairness in Dynamic Ad Hoc Networks," IEEE/ACM Workshop on MobiHoc'02, pp. 226-236, June 2002.
-
(2002)
IEEE/ACM Workshop on MobiHoc'02
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.Y.L.2
-
30
-
-
6944251240
-
Strategy proof trust management in wireless ad hoc network
-
H. Sun and J. Song, "Strategy Proof Trust Management in Wireless Ad Hoc Network," Canadian Conference 2004, Vol.3, pp.1593 - 1596, May 2004.
-
(2004)
Canadian Conference 2004
, vol.3
, pp. 1593-1596
-
-
Sun, H.1
Song, J.2
-
31
-
-
77953817491
-
Supporting the legal identities of contracting agents with an agent authorization platform
-
D.K. Chiu, C. Wang, H.-F. Leung, I. Kafeza and E. Kafeza, "Supporting the Legal Identities of Contracting Agents with An Agent Authorization Platform," International Conference on Electronic Commerce, Vol.113, pp. 721-728, Aug. 2005.
-
(2005)
International Conference on Electronic Commerce
, vol.113
, pp. 721-728
-
-
Chiu, D.K.1
Wang, C.2
Leung, H.-F.3
Kafeza, I.4
Kafeza, E.5
-
32
-
-
0030378202
-
Markovian analysis of large finite state machines
-
G.D. Hachtel, E. Macii, A. Pardo and F. Somenzi, "Markovian Analysis of Large Finite State Machines," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol.15, Issue 12, pp. 1479-1493, Dec. 1993.
-
(1993)
IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems
, vol.15
, Issue.12
, pp. 1479-1493
-
-
Hachtel, G.D.1
Macii, E.2
Pardo, A.3
Somenzi, F.4
|