메뉴 건너뛰기




Volumn 6811 LNCS, Issue , 2011, Pages 177-190

MobiID: A user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks

Author keywords

Cooperating stimulation; Delay Disruption tolerant networks; Reputation based incentive; Security; Selfish

Indexed keywords

COOPERATING STIMULATION; DELAY/DISRUPTION TOLERANT NETWORK; REPUTATION BASED INCENTIVE; SECURITY; SELFISH;

EID: 79960370629     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22450-8_14     Document Type: Conference Paper
Times cited : (40)

References (28)
  • 2
    • 70350238158 scopus 로고    scopus 로고
    • SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks
    • Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X.: SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Transactions on Vehicular Technology 58(8), 4628-4639 (2009)
    • (2009) IEEE Transactions on Vehicular Technology , vol.58 , Issue.8 , pp. 4628-4639
    • Zhu, H.1    Lin, X.2    Lu, R.3    Fan, Y.4    Shen, X.5
  • 5
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • Buttyan, L., Hubaux, J.P.: Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications 8(5), 579-592 (2003)
    • (2003) Mobile Networks and Applications , vol.8 , Issue.5 , pp. 579-592
    • Buttyan, L.1    Hubaux, J.P.2
  • 8
    • 34547532527 scopus 로고    scopus 로고
    • A secure incentive protocol for mobile ad hoc networks
    • Zhang, Y., Lou, W., Liu, W., Fang, Y.: A secure incentive protocol for mobile ad hoc networks. Wireless Networks 13(5), 569-582 (2007)
    • (2007) Wireless Networks , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Lou, W.2    Liu, W.3    Fang, Y.4
  • 9
    • 79960383268 scopus 로고    scopus 로고
    • FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism forMulti-hop Cellular Networks
    • to appear
    • Mahmoud, M.E., Shen, X.: FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism forMulti-hop Cellular Networks. IEEE Trans. onMobile Computing (to appear)
    • IEEE Trans. OnMobile Computing
    • Mahmoud, M.E.1    Shen, X.2
  • 17
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618-644 (2007)
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 19
  • 22
    • 34548583274 scopus 로고    scopus 로고
    • A tutorial on spectral clustering
    • Von Luxburg, U.: A tutorial on spectral clustering. Statistics and Computing 17(4), 395-416 (2007)
    • (2007) Statistics and Computing , vol.17 , Issue.4 , pp. 395-416
    • Von Luxburg, U.1
  • 23
    • 35248844436 scopus 로고    scopus 로고
    • An Identity-Based Signature from Gap Diffie-Hellman Groups
    • Desmedt, Y.G. (ed.) PKC 2003. Springer, Heidelberg
    • Cha, J., Cheon, J.: An Identity-Based Signature From Gap Diffie-Hellman Groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2567 , pp. 18-30
    • Cha, J.1    Cheon, J.2
  • 24
    • 67650224819 scopus 로고    scopus 로고
    • Practical short signature batch verification
    • Fischlin, M. (ed.) CT-RSA 2009. Springer, Heidelberg
    • Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.Ø.: Practical short signature batch verification. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 309-324. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5473 , pp. 309-324
    • Ferrara, A.L.1    Green, M.2    Hohenberger, S.3    Pedersen, M.Ø.4
  • 28
    • 79960347622 scopus 로고    scopus 로고
    • ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks
    • to appear
    • Mahmoud, M.E., Shen, X.: ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-hop Wireless Networks. IEEE Trans. on Mobile Computing (to appear)
    • IEEE Trans. on Mobile Computing
    • Mahmoud, M.E.1    Shen, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.