-
1
-
-
79951680628
-
Trust management for multimedia P2P applications in autonomic networking
-
Multimedia Ad Hoc and Sensor Networks, June
-
F. Almenarez and A. Marin and D. Diaz and A. Cortes and C. Campo and C. Garcia-Rubio, Trust management for multimedia P2P applications in autonomic networking, Ad Hoc Networks, Volume 9, Issue 4, Multimedia Ad Hoc and Sensor Networks, June 2011, Pages 687-697.
-
(2011)
Ad Hoc Networks
, vol.9
, Issue.4
, pp. 687-697
-
-
Almenarez, F.1
Marin, A.2
Diaz, D.3
Cortes, A.4
Campo, C.5
Garcia-Rubio, C.6
-
2
-
-
70249102120
-
Malicious node detection in wireless sensor networks using weighted trust evaluation
-
I.M. Atakli and H. Hu and Y. Chen and W.S. Ku and Z. Su, Malicious node detection in wireless sensor networks using weighted trust evaluation, in Proceedings of the 2008 Spring simulation multiconference (SpringSim '08). Society for Computer Simulation International, 2008, pp. 836-843.
-
(2008)
Proceedings of the 2008 Spring Simulation Multiconference (SpringSim '08). Society for Computer Simulation International
, pp. 836-843
-
-
Atakli, I.M.1
Hu, H.2
Chen, Y.3
Ku, W.S.4
Su, Z.5
-
3
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
A. Boukerche and L. Xu and K. El-Khatib, Trust-based security for wireless ad hoc and sensor networks, the Journal of Computer Communications 30 (11-12) 2007, pp.2413-2427.
-
(2007)
The Journal of Computer Communications
, vol.30
, Issue.11-12
, pp. 2413-2427
-
-
Boukerche, A.1
Xu, L.2
El-Khatib, K.3
-
4
-
-
35148895900
-
Agent-based trust model in wireless sensor networks
-
th ACIS International Conference on Software Engineering, Articial Intelligence, Networking, and Parallel/Distributed Computing, SNPD(03), 2007, pp. 119-124.
-
(2007)
th ACIS International Conference on Software Engineering, Articial Intelligence, Networking, and Parallel/Distributed Computing, SNPD
, Issue.3
, pp. 119-124
-
-
Chen, H.1
Wu, H.2
Zhou, X.3
Gao, C.4
-
5
-
-
47049129658
-
Malicious node detection in wireless sensor networks using an autoregression technique
-
D.I. Curiac and O. Banias and F. Dragan and C. Volosencu and O. Dranga, Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique, in Proceedings of the International conference on Networking and Services (ICNS '07), 2007, p. 83-89.
-
(2007)
Proceedings of the International Conference on Networking and Services (ICNS '07)
, pp. 83-89
-
-
Curiac, D.I.1
Banias, O.2
Dragan, F.3
Volosencu, C.4
Dranga, O.5
-
11
-
-
0000653210
-
Selecting cryptographic key sizes
-
A.K. Lenstra and E.R. Verheul, Selecting cryptographic key sizes, the Journal of Cryptography, 14(4), 2001, pp.255-293.
-
(2001)
The Journal of Cryptography
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
13
-
-
78751649542
-
Trust management in ubiquitous computing: A Bayesian approach
-
Special Issue of Computer Communications on Information and Future Communication Security, 15 March
-
M.K. Denko and Tao Sun and I. Woungang, Trust management in ubiquitous computing: A Bayesian approach, Computer Communications, Volume 34, Issue 3, Special Issue of Computer Communications on Information and Future Communication Security, 15 March 2011, Pages 398-406.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 398-406
-
-
Denko, M.K.1
Sun, T.2
Woungang, I.3
-
14
-
-
33646551446
-
Nonmonotonic trust management for P2P applications
-
25 May
-
M. Czenko and Ha Tran and J. Doumen and S. Etalle and P. Hartel and J. Hartog, Nonmonotonic Trust Management for P2P Applications, Proceedings of the First International Workshop on Security and Trust Management (STM 2005), 25 May 2006, Pages 113-130.
-
(2006)
Proceedings of the First International Workshop on Security and Trust Management (STM 2005)
, pp. 113-130
-
-
Czenko, M.1
Tran, H.2
Doumen, J.3
Etalle, S.4
Hartel, P.5
Hartog, J.6
|