메뉴 건너뛰기




Volumn , Issue , 2009, Pages 167-174

Trust management in emergency networks

Author keywords

[No Author keywords available]

Indexed keywords

CELL PHONE; CENTRALIZED SYSTEMS; EMERGENCY COMMUNICATION; MALICIOUS NODES; NODE REVOCATION; NON-TRIVIAL; REPUTATION MANAGEMENT; THRESHOLD CRYPTOGRAPHY; TIME STAMPS; TRUST MANAGEMENT;

EID: 70349505843     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2009.134     Document Type: Conference Paper
Times cited : (8)

References (17)
  • 1
    • 70349509486 scopus 로고    scopus 로고
    • Online, Available
    • Wikipedia, "Mobile Phone", 2009. [Online]. Available: http://en.wikipedia.org/wiki/Cell-phone
    • (2009) Mobile Phone
  • 2
    • 0031245102 scopus 로고    scopus 로고
    • General packet radio service in gsm
    • October
    • J. Cai and D. J. Goodman, "General packet radio service in gsm", IEEE Communications Magazine, pp. 122-131, October 1997.
    • (1997) IEEE Communications Magazine , pp. 122-131
    • Cai, J.1    Goodman, D.J.2
  • 3
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in selforganizing mobile ad hoc networks
    • L. Buttyan and J.-P. Hubaux, "Stimulating cooperation in selforganizing mobile ad hoc networks", Mob. Netw. Appl., vol. 8, no. 5, pp. 579-592, 2003.
    • (2003) Mob. Netw. Appl , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.-P.2
  • 5
    • 33847008265 scopus 로고    scopus 로고
    • Enhanced reputation mechanism for mobile ad hoc networks
    • J. Liu and V. Issarny, "Enhanced reputation mechanism for mobile ad hoc networks." in iTrust, 2004, pp. 48-62.
    • (2004) iTrust , pp. 48-62
    • Liu, J.1    Issarny, V.2
  • 6
    • 70349525904 scopus 로고    scopus 로고
    • A case for evidence-aware distributed reputation systems - overcoming the limitations of plausibility considerations
    • Oxford, UK, Online, Available
    • P. Obreiter, "A case for evidence-aware distributed reputation systems - overcoming the limitations of plausibility considerations", in Second International Conference on Trust Management (iTrust'04), Oxford, UK, 2004. [Online]. Available: citeseer.ist.psu.edu/obreiter04case.html
    • (2004) Second International Conference on Trust Management (iTrust'04)
    • Obreiter, P.1
  • 8
    • 33847124145 scopus 로고    scopus 로고
    • M. Kinateder and K. Rothermel, Architecture and Algorithms for a Distributed Reputation System, in Proceedings of the First International Conference on Trust Management, ser. LNCS, P. Nixon and S. Terzis, Eds., 2692. Crete, Greece: Springer-Verlag, May 2003, pp. 1-16. [Online]. Available: citeseer.ist.psu.edu/kinateder03architecture.html
    • M. Kinateder and K. Rothermel, "Architecture and Algorithms for a Distributed Reputation System", in Proceedings of the First International Conference on Trust Management, ser. LNCS, P. Nixon and S. Terzis, Eds., vol. 2692. Crete, Greece: Springer-Verlag, May 2003, pp. 1-16. [Online]. Available: citeseer.ist.psu.edu/kinateder03architecture.html
  • 9
    • 33744460343 scopus 로고    scopus 로고
    • Securing information through trust management in wireless networks
    • Buffalo, NY, pp, Sep
    • M. Virendra and S. Upadhyaya, "Securing information through trust management in wireless networks", Workshop on Secure Knowledge Management (SKM 2004), Buffalo, NY, pp. 201-206, Sep 2004.
    • (2004) Workshop on Secure Knowledge Management (SKM 2004) , pp. 201-206
    • Virendra, M.1    Upadhyaya, S.2
  • 10
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Online, Available
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks", IEEE Network, vol. 13, no. 6, pp. 24-30, 1999. [Online]. Available: citeseer.ist.psu.edu/zhou99securing.html
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 12
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing", J. Cryptol., vol. 17, no. 4, pp. 297-319, 2004.
    • (2004) J. Cryptol , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 13
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • New York, NY, USA: Springer-Verlag New York, Inc
    • A. Shamir, "Identity-based cryptosystems and signature schemes", in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
    • (1985) Proceedings of CRYPTO 84 on Advances in cryptology , pp. 47-53
    • Shamir, A.1
  • 14
    • 35048842770 scopus 로고    scopus 로고
    • A. Fernandes, E. Kotsovinos, S. Ostring, and B. Dragovic, Pinocchio: Incentives for honest participation in distributed trust management, in Proceedings of the 2nd International Conference on Trust Management (iTrust 2004), Oxford, UK, Mar. 2004, pp. 63-77, also published in Springer-Verlag Lecture Notes in Computer Science (LNCS), 2995, pp. 63-77.
    • A. Fernandes, E. Kotsovinos, S. Ostring, and B. Dragovic, "Pinocchio: Incentives for honest participation in distributed trust management", in Proceedings of the 2nd International Conference on Trust Management (iTrust 2004), Oxford, UK, Mar. 2004, pp. 63-77, also published in Springer-Verlag Lecture Notes in Computer Science (LNCS), Volume 2995, pp. 63-77.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.