메뉴 건너뛰기




Volumn , Issue , 2010, Pages 253-258

Trustworthy wireless networks: Issues and applications

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION QUALITY; INTERNAL FAULTS; MISBEHAVING NODES; MISOPERATION; NETWORK DYNAMICS; SECURITY MECHANISM; SECURITY SERVICES; SYSTEMATIC SECURITY; TRUST RELATIONSHIP; TRUSTWORTHY NETWORKS; VARIOUS ATTACKS;

EID: 79952543237     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISED.2010.55     Document Type: Conference Paper
Times cited : (5)

References (14)
  • 2
    • 51349133236 scopus 로고    scopus 로고
    • Detecting 802.11 MAC layer spoofing using received signal strength
    • Y. Sheng, K. Tan, G. Chen, D. Kotz and A. Campbell, "Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength," in IEEE INFOCOM 2008, pp. 2441-2449.
    • IEEE INFOCOM 2008 , pp. 2441-2449
    • Sheng, Y.1    Tan, K.2    Chen, G.3    Kotz, D.4    Campbell, A.5
  • 3
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, pp. 2571-2579, 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 10
    • 79952564784 scopus 로고    scopus 로고
    • Mobility reduces uncertainty in MANETs, in IEEE international conference on computer communications
    • F. Li and J. Wu, "Mobility Reduces Uncertainty in MANETs, in IEEE International Conference on Computer Communications," in INFO-COM07.
    • INFO-COM07
    • Li, F.1    Wu, J.2
  • 11
    • 33751024093 scopus 로고    scopus 로고
    • Information trustworthiness evaluation based on trust combination
    • Applied Computing 2006 - The 21st Annual ACM Symposium on Applied Computing - Proceedings of the 2006 ACM Symposium on Applied Computing
    • Y. Zuo and B. Panda, "Information trustworthiness evaluation based on trust combination," in SAC '06: Proceedings of the 2006 ACM symposium on Applied computing, pp. 1880-1885, 2006. (Pubitemid 44759112)
    • (2006) Proceedings of the ACM Symposium on Applied Computing , vol.2 , pp. 1880-1885
    • Zuo, Y.1    Panda, B.2
  • 12
    • 79551638644 scopus 로고    scopus 로고
    • Provenance based information trustworthiness evaluation in multi-hop networks
    • X. Wang, K. Govindan, P. Mohapatra, "Provenance Based Information Trustworthiness Evaluation in Multi-hop Networks," in Globecom, 2010.
    • (2010) Globecom
    • Wang, X.1    Govindan, K.2    Mohapatra, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.