-
2
-
-
0012143045
-
Managing trust in a peer-to-peer information system
-
K. Aberer, Z. Despotovic, Managing trust in a peer-to-peer information system, in: Proceedings of ACM International Conference on Information and Knowledge Management, CIKM, 2001, pp. 422431.
-
(2001)
Proceedings of ACM International Conference on Information and Knowledge Management, CIKM
, pp. 422431
-
-
Aberer, K.1
Despotovic, Z.2
-
3
-
-
58049134979
-
A Bayesian filter to detect misbehaving nodes in MANETs
-
NTMS'08.5-7, Nov. 2008
-
Y. Beghriche, V. Toubiana, H. Labiod, A Bayesian filter to detect misbehaving nodes in MANETs, in: New Technologies, Mobility and Security, 2008. NTMS'08.5-7, Nov. 2008, pp. 15.
-
(2008)
New Technologies, Mobility and Security
, pp. 15
-
-
Beghriche, Y.1
Toubiana, V.2
Labiod, H.3
-
6
-
-
33745900048
-
A robust reputation system for P2P and mobile ad hoc networks
-
Harvard University, Boston, Cambridge, MA
-
S. Buchegger, J.L. Boudec, A robust reputation system for P2P and mobile ad hoc networks, in: Proceedings of the 2nd Workshop on the Economics of Peer to Peer Systems, Harvard University, Boston, Cambridge, MA, 2004, pp. 110.
-
(2004)
Proceedings of the 2nd Workshop on the Economics of Peer to Peer Systems
, pp. 110
-
-
Buchegger, S.1
Boudec, J.L.2
-
8
-
-
64049107478
-
E-Hermes: A robust cooperative trust establishment scheme for mobile Ad Hoc netwroks
-
Z. Charikleia, L.M. Brian, H. Marek, and K.T. Roshan E-Hermes: a robust cooperative trust establishment scheme for mobile Ad Hoc netwroks Ad Hoc Networks 7 2009 1156 1168
-
(2009)
Ad Hoc Networks
, vol.7
, pp. 1156-1168
-
-
Charikleia, Z.1
Brian, L.M.2
Marek, H.3
Roshan, K.T.4
-
9
-
-
0010344835
-
A distributed trust model for peer-to-peer networks [R]
-
R. Chen, Poblano Yeager W., A distributed trust model for peer-to-peer networks [R], Sun Microsystems, 2000.
-
(2000)
Sun Microsystems
-
-
Chen, R.1
Poblano Yeager, W.2
-
10
-
-
78650018245
-
Undulating grey model (UGM)GM(1, 1 | tan (k - τ) p, sin (k - τ) p)
-
Julong Deng Undulating grey model (UGM)GM(1, 1 | tan (k - τ) p, sin (k - τ) p) The Journal of Grey System 13 3 2001 201 205
-
(2001)
The Journal of Grey System
, vol.13
, Issue.3
, pp. 201-205
-
-
Deng, J.1
-
11
-
-
70849089410
-
A novel grey model GM(1, 1 | τ, r): Generalizing GM(1, 1)
-
Julong Deng A novel grey model GM(1, 1 | τ, r): generalizing GM(1, 1) The Journal of Grey System 13 1 2001 1 8
-
(2001)
The Journal of Grey System
, vol.13
, Issue.1
, pp. 1-8
-
-
Deng, J.1
-
12
-
-
50849151631
-
Control problems of grey systems
-
Julong Deng Control problems of grey systems Systems and Control Letters 5 1982 288 294
-
(1982)
Systems and Control Letters
, vol.5
, pp. 288-294
-
-
Deng, J.1
-
14
-
-
33646934644
-
Bridge nodes based secure OLSR
-
IEEE Press Wu Han, China
-
Hong Fan, Fu Cai, Hong Liang, and Chen Jing Bridge nodes based secure OLSR 2005 International Conference on Wireless Communications Networking and Mobile Computing 2005 IEEE Press Wu Han, China 710 713
-
(2005)
2005 International Conference on Wireless Communications Networking and Mobile Computing
, pp. 710-713
-
-
Fan, H.1
Cai, F.2
Liang, H.3
Jing, C.4
-
15
-
-
65349136942
-
Incomplete information nodes risk assessment in mobile ad hoc networks
-
Cai Fu, and Liang Hong Incomplete information nodes risk assessment in mobile ad hoc networks Chinese Journal of Computer 32 4 2009 805 815
-
(2009)
Chinese Journal of Computer
, vol.32
, Issue.4
, pp. 805-815
-
-
Fu, C.1
Hong, L.2
-
16
-
-
33645777447
-
Self-organized public-key management for mobile ad hoc networks based on a bidirectional trust model
-
Cai Fu, and Fan Hong Self-organized public-key management for mobile ad hoc networks based on a bidirectional trust model Wuhan University Journal of Natural Science 1,11 1 2006 1188 1189
-
(2006)
Wuhan University Journal of Natural Science
, vol.111
, Issue.1
, pp. 1188-1189
-
-
Fu, C.1
Hong, F.2
-
19
-
-
19944395899
-
Propagation of trust and dist rust
-
New York, USA: Association for Computing Machinery, New York, United States
-
R. Guha, R. Kumar, P. Raghavan, Propagation of trust and dist rust, in: Proceedings of the 13th International World Wide Web Conference Proceedings, WWW2004, New York, USA: Association for Computing Machinery, New York, United States, 2004, pp. 1722.
-
(2004)
Proceedings of the 13th International World Wide Web Conference Proceedings, WWW2004
, pp. 1722
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
-
20
-
-
66349134399
-
Mitigation of the effects of selfish and malicious nodes in Ad-Hoc networks
-
H. Hallani, and S.A. Shahrestani Mitigation of the effects of selfish and malicious nodes in Ad-Hoc networks WSEAS Transactions on Computers 8 2 2009 205 221
-
(2009)
WSEAS Transactions on Computers
, vol.8
, Issue.2
, pp. 205-221
-
-
Hallani, H.1
Shahrestani, S.A.2
-
22
-
-
78650660068
-
Security weakness in MANET
-
Bell Labs, January 2001
-
M. Jacobson, S. Wetzel, Security weakness in MANET, Technical Report, Bell Labs, January 2001.
-
Technical Report
-
-
Jacobson, M.1
Wetzel, S.2
-
23
-
-
0242719010
-
Trust based decision making for electronic transactions
-
L. Yngstrom, T. Svensson, Stockholm University Press Kista
-
A. Jøsang Trust based decision making for electronic transactions L. Yngstrom, T. Svensson, Proceedings of the 4th Nordic Workshop on Secure Computer Systems 1999 Stockholm University Press Kista 1 21
-
(1999)
Proceedings of the 4th Nordic Workshop on Secure Computer Systems
, pp. 1-21
-
-
Jøsang, A.1
-
24
-
-
67650720681
-
A trust model based on fuzzy recommendation for mobile Ad-Hoc networks
-
Luo Junhai, Liu Xue, and Fan Mingyu A trust model based on fuzzy recommendation for mobile Ad-Hoc networks Computer Networks 53 2009 2396 2407
-
(2009)
Computer Networks
, vol.53
, pp. 2396-2407
-
-
Junhai, L.1
Xue, L.2
Mingyu, F.3
-
26
-
-
25844471287
-
Constructing internet coordinate system based on delay measurement
-
H. Lim, J.C. Hou, C. Choi, Constructing internet coordinate system based on delay measurement, in: Proc. of the 3rd ACM IMC, 2003, pp. 129142.
-
(2003)
Proc. of the 3rd ACM IMC
, pp. 129142
-
-
Lim, H.1
Hou, J.C.2
Choi, C.3
-
27
-
-
79960110855
-
Security in ad hoc networks: From vulnerability to risk assessment
-
Systems and Technologies, SECURWARE
-
A. Marianne, M.E. Sherif, S.E. Magdy, Security in ad hoc networks: from vulnerability to risk assessment, in: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE, 2009, pp. 203209.
-
(2009)
2009 Third International Conference on Emerging Security Information
, pp. 203209
-
-
Marianne, A.1
Sherif, M.E.2
Magdy, S.E.3
-
29
-
-
63049099708
-
Reliable and fully distributed trust model for mobile ad hoc networks
-
O. Mawloud, C. Yacine, and B. Abdelmadjid Reliable and fully distributed trust model for mobile ad hoc networks Computer & Security 28 2009 199 214
-
(2009)
Computer & Security
, vol.28
, pp. 199-214
-
-
Mawloud, O.1
Yacine, C.2
Abdelmadjid, B.3
-
30
-
-
34548140666
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks
-
Portoroz, Slovenia
-
Michiardi Pietro, Molva Refik, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks, in: Proceedings of the 6th IFIP Conference on Security Communications and Multimedia, CMS 2002, Portoroz, Slovenia, 2002, pp. 107121.
-
(2002)
Proceedings of the 6th IFIP Conference on Security Communications and Multimedia, CMS 2002
, pp. 107121
-
-
Pietro, M.1
Refik, M.2
-
31
-
-
0242439292
-
Research of subjective trust management model based on the fuzzy set theory
-
W Tang, and Z. Chen Research of subjective trust management model based on the fuzzy set theory Chinese Journal of Software 14 8 2003 1401 1408
-
(2003)
Chinese Journal of Software
, vol.14
, Issue.8
, pp. 1401-1408
-
-
Tang, W.1
Chen, Z.2
-
35
-
-
23144456445
-
Bayesian network trust model in peer to peer networks
-
Springer Verlag Melbourne, Australia, Heidelberg, D269121, Germany
-
Y. Wang, and J. Vassileva Bayesian network trust model in peer to peer networks Proceedings of the 2nd International Workshop: AP2PC 2003 Agent s and Peer to Peer Computing 2003 Springer Verlag Melbourne, Australia, Heidelberg, D269121, Germany 23 24
-
(2003)
Proceedings of the 2nd International Workshop: AP2PC 2003 Agent S and Peer to Peer Computing
, pp. 23-24
-
-
Wang, Y.1
Vassileva, J.2
-
36
-
-
3142738238
-
Peer trust: Supporting reputation based trust in peer to peer communities
-
IEEE Transactions on Data and Knowledge Engineering (special issue)
-
L. Xiong, and L. Liu Peer trust: supporting reputation based trust in peer to peer communities Peer to Peer Based Data Management IEEE Transactions on Data and Knowledge Engineering 16 7 2004 843 857 (special issue)
-
(2004)
Peer to Peer Based Data Management
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
37
-
-
67649360224
-
A principle component analysis based method on evaluating wireless mobile ad hoc network routing protocols
-
P. Yang, G. Qin, C. Tian, G. Chen, A principle component analysis based method on evaluating wireless mobile ad hoc network routing protocols, in: Proceedings 2nd International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2009, pp. 106109.
-
Proceedings 2nd International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2009
, pp. 106109
-
-
Yang, P.1
Qin, G.2
Tian, C.3
Chen, G.4
-
41
-
-
58149089608
-
Fuzzy dynamic programming based trusted routing decision in mobile Ad Hoc networks
-
IEEE Press Beijing, China
-
Qin Zhiwei, Jia Zhiping, and Chen Xihui Fuzzy dynamic programming based trusted routing decision in mobile Ad Hoc networks Embedded Computing, SEC'08, Fifth IEEE International Symposium 2008 IEEE Press Beijing, China 180 185
-
(2008)
Embedded Computing, SEC'08, Fifth IEEE International Symposium
, pp. 180-185
-
-
Zhiwei, Q.1
Zhiping, J.2
Xihui, C.3
-
42
-
-
0033357103
-
Securing ad hoc networks
-
Li-dong Zhou, and Zygmunt J. Haas Securing ad hoc networks IEEE Network 13 1999 24 29
-
(1999)
IEEE Network
, vol.13
, pp. 24-29
-
-
Zhou, L.-D.1
Haas, Z.J.2
|