-
1
-
-
70349509486
-
-
Online, Available
-
Wikipedia, "Mobile Phone", 2009. [Online]. Available: http://en.wikipedia.org/wiki/Cell-phone
-
(2009)
Mobile Phone
-
-
-
2
-
-
0031245102
-
General packet radio service in gsm
-
October
-
J. Cai and D. J. Goodman, "General packet radio service in gsm", IEEE Communications Magazine, pp. 122-131, October 1997.
-
(1997)
IEEE Communications Magazine
, pp. 122-131
-
-
Cai, J.1
Goodman, D.J.2
-
3
-
-
0042660545
-
Stimulating cooperation in selforganizing mobile ad hoc networks
-
L. Buttyan and J.-P. Hubaux, "Stimulating cooperation in selforganizing mobile ad hoc networks", Mob. Netw. Appl., vol. 8, no. 5, pp. 579-592, 2003.
-
(2003)
Mob. Netw. Appl
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
4
-
-
33846609555
-
A computational model of trust and reputation for e-businesses
-
Washington, DC, USA: IEEE Computer Society
-
L. Mui, M. Mohtashemi, and A. Halberstadt, "A computational model of trust and reputation for e-businesses", in HICSS '02: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7. Washington, DC, USA: IEEE Computer Society, 2002, p. 188.
-
(2002)
HICSS '02: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)
, vol.7
, pp. 188
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
5
-
-
33847008265
-
Enhanced reputation mechanism for mobile ad hoc networks
-
J. Liu and V. Issarny, "Enhanced reputation mechanism for mobile ad hoc networks." in iTrust, 2004, pp. 48-62.
-
(2004)
iTrust
, pp. 48-62
-
-
Liu, J.1
Issarny, V.2
-
6
-
-
70349525904
-
A case for evidence-aware distributed reputation systems - overcoming the limitations of plausibility considerations
-
Oxford, UK, Online, Available
-
P. Obreiter, "A case for evidence-aware distributed reputation systems - overcoming the limitations of plausibility considerations", in Second International Conference on Trust Management (iTrust'04), Oxford, UK, 2004. [Online]. Available: citeseer.ist.psu.edu/obreiter04case.html
-
(2004)
Second International Conference on Trust Management (iTrust'04)
-
-
Obreiter, P.1
-
8
-
-
33847124145
-
-
M. Kinateder and K. Rothermel, Architecture and Algorithms for a Distributed Reputation System, in Proceedings of the First International Conference on Trust Management, ser. LNCS, P. Nixon and S. Terzis, Eds., 2692. Crete, Greece: Springer-Verlag, May 2003, pp. 1-16. [Online]. Available: citeseer.ist.psu.edu/kinateder03architecture.html
-
M. Kinateder and K. Rothermel, "Architecture and Algorithms for a Distributed Reputation System", in Proceedings of the First International Conference on Trust Management, ser. LNCS, P. Nixon and S. Terzis, Eds., vol. 2692. Crete, Greece: Springer-Verlag, May 2003, pp. 1-16. [Online]. Available: citeseer.ist.psu.edu/kinateder03architecture.html
-
-
-
-
9
-
-
33744460343
-
Securing information through trust management in wireless networks
-
Buffalo, NY, pp, Sep
-
M. Virendra and S. Upadhyaya, "Securing information through trust management in wireless networks", Workshop on Secure Knowledge Management (SKM 2004), Buffalo, NY, pp. 201-206, Sep 2004.
-
(2004)
Workshop on Secure Knowledge Management (SKM 2004)
, pp. 201-206
-
-
Virendra, M.1
Upadhyaya, S.2
-
10
-
-
0033357103
-
Securing ad hoc networks
-
Online, Available
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks", IEEE Network, vol. 13, no. 6, pp. 24-30, 1999. [Online]. Available: citeseer.ist.psu.edu/zhou99securing.html
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
12
-
-
23044435711
-
Short signatures from the weil pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing", J. Cryptol., vol. 17, no. 4, pp. 297-319, 2004.
-
(2004)
J. Cryptol
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
13
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
New York, NY, USA: Springer-Verlag New York, Inc
-
A. Shamir, "Identity-based cryptosystems and signature schemes", in Proceedings of CRYPTO 84 on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1985, pp. 47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in cryptology
, pp. 47-53
-
-
Shamir, A.1
-
14
-
-
35048842770
-
-
A. Fernandes, E. Kotsovinos, S. Ostring, and B. Dragovic, Pinocchio: Incentives for honest participation in distributed trust management, in Proceedings of the 2nd International Conference on Trust Management (iTrust 2004), Oxford, UK, Mar. 2004, pp. 63-77, also published in Springer-Verlag Lecture Notes in Computer Science (LNCS), 2995, pp. 63-77.
-
A. Fernandes, E. Kotsovinos, S. Ostring, and B. Dragovic, "Pinocchio: Incentives for honest participation in distributed trust management", in Proceedings of the 2nd International Conference on Trust Management (iTrust 2004), Oxford, UK, Mar. 2004, pp. 63-77, also published in Springer-Verlag Lecture Notes in Computer Science (LNCS), Volume 2995, pp. 63-77.
-
-
-
-
17
-
-
85023809951
-
Threshold cryptosystems
-
New York, NY, USA: Springer-Verlag New York, Inc
-
Y. G. Desmedt and Y. Frankel, "Threshold cryptosystems", in CRYPTO '89: Proceedings on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1989, pp. 307-315.
-
(1989)
CRYPTO '89: Proceedings on Advances in cryptology
, pp. 307-315
-
-
Desmedt, Y.G.1
Frankel, Y.2
|