-
1
-
-
33745456457
-
Toward a decentralized trust-based access control system for dynamic collaboration
-
15-17 June, West Point, NY
-
W. J. Adams, N. J. Davis, "Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration," Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW'05), 15-17 June, 2005, West Point, NY, pp. 317-324.
-
(2005)
Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW'05)
, pp. 317-324
-
-
Adams, W.J.1
Davis, N.J.2
-
2
-
-
28444452986
-
Calculating a node's reputation in a mobile ad hoc network
-
Phoenix, AX, 7-9 April
-
W. J. Adams, G. C. Hadjichristofi and N. J. Davis, "Calculating a Node's Reputation in a Mobile Ad Hoc Network," Proc. 24th IEEE Int'l Performance Computing and Communications Conference (IPCCC'05), Phoenix, AX, 7-9 April 2005, pp. 303-307.
-
(2005)
Proc. 24th IEEE Int'l Performance Computing and Communications Conference (IPCCC'05)
, pp. 303-307
-
-
Adams, W.J.1
Hadjichristofi, G.C.2
Davis, N.J.3
-
3
-
-
84860703392
-
Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks
-
Gold Coast, Australia, 21-26 May
-
E. Ahmed, K. Samad and W. Mahmood, "Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks." AusCERT Asia Pacific Information Technology Security Conf., Gold Coast, Australia, 21-26 May 2006.
-
(2006)
AusCERT Asia Pacific Information Technology Security Conf.
-
-
Ahmed, E.1
Samad, K.2
Mahmood, W.3
-
4
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
Apr.
-
P. Albers, O. Camp, J.-M. Percher, B. Jouga, L. Mé, R. Puttini, "Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches", Proc. 1st Int'l Workshop on Wireless Information Systems (WIS-2002), Apr. 2002, pp. 1-12.
-
(2002)
Proc. 1st Int'l Workshop on Wireless Information Systems (WIS-2002)
, pp. 1-12
-
-
Albers, P.1
Camp, O.2
Percher, J.-M.3
Jouga, B.4
Mé, L.5
Puttini, R.6
-
5
-
-
14344264010
-
Cooperative games, phase transition on graphs and distributed trust in MANETs
-
Atlantis, Bahamas, 14-17 Dec.
-
J. S. Baras and T. Jiang, "Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANETs," Proc. 43th IEEE Conf. on Decision and Control (CDC'04), Atlantis, Bahamas, 14-17 Dec. 2004, vol. 1, pp. 93-98.
-
(2004)
Proc. 43th IEEE Conf. on Decision and Control (CDC'04)
, vol.1
, pp. 93-98
-
-
Baras, J.S.1
Jiang, T.2
-
6
-
-
0029700344
-
Decentralized trust management
-
6-8 May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. IEEE Symposium on Security and Privacy, 6-8 May, 1996, pp. 164-173.
-
(1996)
Proc. IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
63449141260
-
A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks
-
Vancouver, British Columbia, Canada
-
A. Boukerche and Y. Ren, "A Security Management Scheme using a Novel Computational Reputation Model for Wireless and Mobile Ad Hoc Networks," Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Vancouver, British Columbia, Canada, pp. 88-95, 2008
-
(2008)
Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems
, pp. 88-95
-
-
Boukerche, A.1
Ren, Y.2
-
8
-
-
0242678584
-
Self-Organized public-key management for mobile ad hoc networks
-
Jan.-Mar.
-
S. Capkun, L. Buttyan, and J. -P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, Jan.-Mar. 2003, pp. 52-64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
9
-
-
70749134483
-
Toward a human trust model for mobile ad-hoc networks
-
5-7 May Cambridge University, Cambridge, UK.
-
L. Capra, "Toward a Human Trust Model for Mobile Ad-hoc Networks," Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge, UK.
-
(2004)
Proc. 2nd UK-UbiNet Workshop
-
-
Capra, L.1
-
10
-
-
79957699559
-
Towards trust-based cognitive networks: A survey of trust management for mobile ad hoc networks
-
Washington D.C. 15-17 June
-
J. H. Cho and A. Swami, "Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks," 14th Int'l Command and Control Research and Technology Symposium, Washington D.C. 15-17 June 2009.
-
(2009)
14th Int'l Command and Control Research and Technology Symposium
-
-
Cho, J.H.1
Swami, A.2
-
11
-
-
0003247337
-
Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations
-
Jan.
-
S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations," RFC 2501, Jan. 1999.
-
(1999)
RFC 2501
-
-
Corson, S.1
Macker, J.2
-
12
-
-
0003552195
-
-
K. S. Cook (editor), Feb. Russell Sage Foundation Series on Trust, New York.
-
K. S. Cook (editor), Trust in Society, vol. 2, Feb. 2003, Russell Sage Foundation Series on Trust, New York.
-
(2003)
Trust in Society
, vol.2
-
-
-
13
-
-
29844453185
-
Towards designing a trust routing solution in mobile ad hoc networks
-
T. Ghosh, N. Pissinou, and K. Makki, "Towards Designing a Trust Routing Solution in Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 10, pp. 985-995, 2005.
-
(2005)
Mobile Networks and Applications
, vol.10
, pp. 985-995
-
-
Ghosh, T.1
Pissinou, N.2
Makki, K.3
-
14
-
-
3042647171
-
Ant-based adaptive trust evidence distribution in MANET
-
Tokyo, Japan, 23-24 March
-
T. Jiang and J. S. Baras, "Ant-based Adaptive Trust Evidence Distribution in MANET," Proc. 2nd Int'l Conf. on Mobile Distributed Computing Systems Workshops (MDC), Tokyo, Japan, 23-24 March 2004, pp.588-593.
-
(2004)
Proc. 2nd Int'l Conf. on Mobile Distributed Computing Systems Workshops (MDC)
, pp. 588-593
-
-
Jiang, T.1
Baras, J.S.2
-
15
-
-
33947387917
-
Trust management in distributed systems
-
Feb.
-
H. Li and M. Singhal, "Trust Management in Distributed Systems," Computer, vol. 40, no. 2, Feb. 2007, pp. 45-53.
-
(2007)
Computer
, vol.40
, Issue.2
, pp. 45-53
-
-
Li, H.1
Singhal, M.2
-
16
-
-
42649129419
-
Future trust management framework for mobile ad hoc networks: Security in mobile ad hoc
-
Apr.
-
J. Li, R. Li, and J. Kato, "Future Trust Management Framework for Mobile Ad Hoc Networks: Security in Mobile Ad Hoc," IEEE Communications Magazine, vol. 46, no. 4, Apr. 2008, pp. 108-114.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 108-114
-
-
Li, J.1
Li, R.2
Kato, J.3
-
17
-
-
84942438500
-
Batch rekeying for secure group communications
-
Hong Kong, Hong Kong, May
-
X. Li, Y. R. Yang, M.G. Gouda, and S.S. Lam, "Batch Rekeying for Secure Group Communications," Proc. 10th Int'l Conf. on World Wide Web, Hong Kong, Hong Kong, May 2001, pp. 525-534.
-
(2001)
Proc. 10th Int'l Conf. on World Wide Web
, pp. 525-534
-
-
Li, X.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
18
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
Dec.
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Transactions on Networking (TON), vol. 12, no. 6, Dec. 2004, pp. 1049-1063.
-
(2004)
IEEE/ACM Transactions on Networking (TON)
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
19
-
-
38749146509
-
Analysis of a reputation system for mobile ad hoc networks with liars
-
Mar.
-
J. Mundinger and J. Le Boudec, "Analysis of a Reputation System for Mobile Ad Hoc Networks with Liars," Performance Evaluation, vol. 65, no. 3-4, pp. 212-226, Mar. 2008.
-
(2008)
Performance Evaluation
, vol.65
, Issue.3-4
, pp. 212-226
-
-
Mundinger, J.1
Boudec, J.L.2
-
22
-
-
33144484173
-
Special issue on security in wireless ad hoc networks
-
F. Anjum, A. K. Ghosh, N. Golmie, P. Kolodzy, R. Poovendran, R. Shorey, and D. Lee, Guest Editors, Feb.
-
F. Anjum, A. K. Ghosh, N. Golmie, P. Kolodzy, R. Poovendran, R. Shorey, and D. Lee, Guest Editors, "Special Issue on Security in Wireless Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006, pp. 217-220.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 217-220
-
-
-
23
-
-
33846911348
-
Cognitive networks: Adaptation and learning to achieve end-to-End performance objectives
-
Topics in Radio Communications, Dec.
-
R. W. Thomas, D. H. Friend, L. A. DaSilva, and A.B. MacKenzie, "Cognitive Networks: Adaptation and Learning to Achieve End-to-End Performance Objectives," IEEE Communications Magazine, Topics in Radio Communications, Dec. 2006, pp. 51-57.
-
(2006)
IEEE Communications Magazine
, pp. 51-57
-
-
Thomas, R.W.1
Friend, D.H.2
DaSilva, L.A.3
MacKenzie, A.B.4
-
24
-
-
34748878894
-
Fine-grained reputation-based routing in wireless ad hoc networks
-
4258677, ISI 2007: 2007 IEEE Intelligence and Security Informatics
-
L. Yang, J. M. Kizza, A. Cemerlic, and F. Liu, "Fine-grained Reputation-based Routing in Wireless Ad Hoc Networks," IEEE Intelligence and Security Informatics, 23-24 May 2007, pp. 75-78. (Pubitemid 47469218)
-
(2007)
ISI 2007: 2007 IEEE Intelligence and Security Informatics
, pp. 75-78
-
-
Yang, L.1
Kizza, J.M.2
Cemerlic, A.3
Liu, F.4
|