-
1
-
-
44049108171
-
Attacks on trust valuation in distributed networks
-
March
-
Sun, Y.L., Han, Z., Yu, W., and Ray, L.K.J.: ' Attacks on trust valuation in distributed networks ', Proc. 40th Annual Conf. on Information Sciences and Systems, March, 2006, p. 1461-1466
-
(2006)
Proc. 40th Annual Conf. on Information Sciences and Systems
, pp. 1461-1466
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Ray, L.K.J.4
-
2
-
-
33744915525
-
Trust establishment in pure ad-hoc networks
-
DOI 10.1007/s11277-006-1574-5
-
Pirzada, A.A., and McDonald, C.: ' Trust establishment in pure ad hoc networks ', Wirel. Pers. Commun., 2006, 37, (1), p. 39-168 10.1007/s11277-006- 1574-5 0929-6212 (Pubitemid 43847195)
-
(2006)
Wireless Personal Communications
, vol.37
, Issue.1-2
, pp. 139-168
-
-
Pirzada, A.A.1
McDonald, C.2
-
3
-
-
84948698587
-
A computational model of trust and reputation
-
January
-
Miu, L., Mohtashemi, M., and Halberstadt, A.: ' A computational model of trust and reputation ', Proc. 35th Annual Hawaii Int. Conf. on System Sciences, January, 2002
-
(2002)
Proc. 35th Annual Hawaii Int. Conf. on System Sciences
-
-
Miu, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
4
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
10.1145/581291.581312
-
Zapata, M.G., and Asokan, N.: ' Secure ad hoc on-demand distance vector routing ', ACM Mobile Comput. Commun. Rev., 2002, 3, (6), p. 106-107 10.1145/581291.581312
-
(2002)
ACM Mobile Comput. Commun. Rev.
, vol.3
, Issue.6
, pp. 106-107
-
-
Zapata, M.G.1
Asokan, N.2
-
5
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, September
-
Hu, Y.C., Perrig, A., and Johnson, D.B.: ' Ariadne: a secure on-demand routing protocol for ad hoc networks ', Proc. Int. Conf. Mobile Computing and Networking (Mobicom'02), Atlanta, Georgia, September, 2002, p. 12-23
-
(2002)
Proc. Int. Conf. Mobile Computing and Networking (Mobicom'02)
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
33749513451
-
A reputation-based mechanism for isolating selfish nodes in ad hoc networks
-
DOI 10.1109/MOBIQUITOUS.2005.7, 1540982, MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
-
Refaei, M.T., Srivastava, V., and DaSilva, L.: et al. ' A reputation-based mechanism for isolating selfish nodes in ad hoc networks ', Proc. MobiQuitous, Washington, DC, 2005, p. 3-11 (Pubitemid 44523259)
-
(2005)
MobiQuitous 2005: Second Annual International Conference on Mobile and Ubiquitous Systems -Networking and Services
, pp. 3-11
-
-
Refaei, M.T.1
Srivastava, V.2
DaSilva, L.3
Eltoweissy, M.4
-
7
-
-
0002137142
-
-
Tomasz, I., Hank, K., 1st (Kluwer Academic Press)
-
Johnson, D., and Maltz, D.: ' Dynamic source routing in ad hoc wireless networks ', Tomasz, I., Hank, K., Mobile computing, 1st (Kluwer Academic Press, 1996), p. 153-181
-
(1996)
Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
8
-
-
33745877154
-
Trust-based route selection in dynamic source routing
-
3986 LNCS, DOI 10.1007/11755593-12, Trust Management - 4th International Conference, iTrust 2006, Proceedings
-
Jensen, C.D., and Connell, P.O.: ' Trust-based route selection in dynamic source routing ', Proc. Int. Conf. on Trust Management, Pisa, Italy, May, 2006, p. 150-163 (Pubitemid 44045023)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 150-163
-
-
Jensen, C.D.1
Connell, P.O.2
-
9
-
-
77954335599
-
Fuzzy nature of trust and dynamic trust modeling in service oriented environments
-
November
-
Chang, E.J., Hussain, F.K., and Dillon, T.S.: ' Fuzzy nature of trust and dynamic trust modeling in service oriented environments ', Proc. Workshop on Secure Web Services, November, 2005, p. 75-83
-
(2005)
Proc. Workshop on Secure Web Services
, pp. 75-83
-
-
Chang, E.J.1
Hussain, F.K.2
Dillon, T.S.3
-
10
-
-
0036362188
-
An evidential model of distributed reputation management
-
Yu, B., and Singh, M.P.: ' An evidential model of distributed reputation management ', Proc. First Int. Joint Conf. on Autonomous Agents and Multiagent Systems: Part 1, New York, 2002, p. 294-301 (Pubitemid 34975468)
-
(2002)
Proceedings of the International Conference on Autonomous Agents
, Issue.2
, pp. 294-301
-
-
Yu, B.1
Singh, M.P.2
-
11
-
-
0002863367
-
Valuation of trust in open network
-
Beth, T., Borcherding, M., and Klein, B.: ' Valuation of trust in open network ', Proc. ESORICS, 1994, p. 3-18
-
(1994)
Proc. ESORICS
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
12
-
-
0347608169
-
A logic for uncertain probabilities
-
Josang, A.: ' A logic for uncertain probabilities ', Int. J. Uncertainty, Fuzziness, Knowledge-Based Syst., 2001, 9, (3), p. 279-311 10.1016/S0218- 4885(01)00083-1 (Pubitemid 33682967)
-
(2001)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Josang, A.1
-
13
-
-
11144261348
-
-
PhD, Massachusetts
-
Mui, L.: ' Computational models of trust and reputation: agents, evolutionary games, and social networks ', 2003, PhD, Massachusetts
-
(2003)
Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks
-
-
Mui, L.1
-
14
-
-
39749185249
-
Two novel trust evaluation algorithms
-
DOI 10.1109/ICCCAS.2006.284988, 4064214, 2006 International Conference on Communications, Circuits and Systems, ICCCAS, Proceedings - Computer, Optical and Broadband Communications, Computational Intelligence
-
Durad, M.H., Cao, Y.D., and Zhu, L.H.: ' Two novel trust evaluation algorithm ', Proc. Communications Circuits and Systems, June, 2006, 3, p. 1641-1646 (Pubitemid 351307334)
-
(2006)
2006 International Conference on Communications, Circuits and Systems, ICCCAS, Proceedings
, vol.3
, pp. 1641-1646
-
-
Durad, M.H.1
Cao, Y.2
Liehuang, Z.3
-
16
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
DOI 10.1109/JSAC.2005.861389
-
Sun, Y.L., Yu, W., Han, Z., and Ray, L.K.J.: ' Information theoretic framework of trust modeling and evaluation for ad hoc networks ', IEEE J. Sel. Areas Commun., 2006, 24, (2), p. 305-319 10.1109/JSAC.2005.861389 0733-8716 (Pubitemid 43269751)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-315
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
-
17
-
-
34447134866
-
Trust modeling and evaluation in ad hoc networks
-
Sun, Y.L., Yu, W., Han, Z., and Ray, L.K.J.: ' Trust modeling and evaluation in ad hoc networks ', Proc. Global Telecommunications, 2005, p. 1-10
-
(2005)
Proc. Global Telecommunications
, pp. 1-10
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Ray, L.K.J.4
-
18
-
-
77950910834
-
A subjective trust management model based on certainty-factor for MANETs
-
Luo, J.H., and Fan, M.Y.: ' A subjective trust management model based on certainty-factor for MANETs ', Chin. J. Comput. Res. Dev., 2010, 47, (3), p. 515-523
-
(2010)
Chin. J. Comput. Res. Dev.
, vol.47
, Issue.3
, pp. 515-523
-
-
Luo, J.H.1
Fan, M.Y.2
-
19
-
-
70449338320
-
Method of ameliorative multi-objective synthetic evaluation based on entropy weight and its application
-
Wen, L.C., Zhang, X.F., and Zhu, L.M.: ' Method of ameliorative multi-objective synthetic evaluation based on entropy weight and its application ', Proc. Control and Decision Conf., CCDC'09, 2009, p. 1538-1541
-
(2009)
Proc. Control and Decision Conf., CCDC'09
, pp. 1538-1541
-
-
Wen, L.C.1
Zhang, X.F.2
Zhu, L.M.3
-
20
-
-
33646410469
-
Performance comparison of trust-based reactive routing protocols
-
10.1109/TMC.2006.83
-
Pirzada, A.A., McDonald, C., and Datta, A.: ' Performance comparison of trust-based reactive routing protocols ', IEEE Trans. Mobile Comput., 2006, 5, (6), p. 695-710 10.1109/TMC.2006.83
-
(2006)
IEEE Trans. Mobile Comput.
, vol.5
, Issue.6
, pp. 695-710
-
-
Pirzada, A.A.1
McDonald, C.2
Datta, A.3
-
21
-
-
33646947001
-
Dynamic trust evaluation based routing model for ad hoc networks
-
DOI 10.1109/WCNM.2005.1544157, 1544157, Proceedings - 2005 International Conference on Wireless Communications, Networking and Mobile Computing, WCNM 2005
-
Guo, W., Xiong, Z.W., and Li, Z.T.: ' Dynamic trust evaluation based routing model for ad hoc networks ', Proc. Wireless Communications, Networking and Mobile Computing, September, 2005, 2, p. 727-730 (Pubitemid 43791253)
-
(2005)
Proceedings - 2005 International Conference on Wireless Communications, Networking and Mobile Computing, WCNM 2005
, vol.2
, pp. 727-730
-
-
Guo, W.1
Xiong, Z.2
Li, Z.3
-
22
-
-
52349116758
-
-
Martin, J., Manickam, L., and Shanmugavel, S.: ' Fuzzy based trusted ad hoc on-demand distance vector routing protocol for MANET' ', 2007, p. 414-421, Adv. Comput. Commun. (ADCOM 2007)
-
(2007)
Fuzzy Based Trusted Ad Hoc On-demand Distance Vector Routing Protocol for MANET'
, pp. 414-421
-
-
Martin, J.1
Manickam, L.2
Shanmugavel, S.3
-
23
-
-
79961145911
-
A subjective trust management model based on AHP for MANET
-
June
-
Xia, H., Jia, Z.P., Li, X., and Zhang, F.: ' A subjective trust management model based on AHP for MANET ', Proc. Int. Conf. on Network Computing and Information Security (NCIS'11), June, 2011, p. 363-368
-
(2011)
Proc. Int. Conf. on Network Computing and Information Security (NCIS'11)
, pp. 363-368
-
-
Xia, H.1
Jia, Z.P.2
Li, X.3
Zhang, F.4
-
25
-
-
19944395899
-
Propagation of trust and distrust
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
Guha, R.V., Kumar, R., Raghavan, P., and Tomkins, A.: ' Propagation of trust and distrust ', Proc. WWW, 2004, p. 403-412 (Pubitemid 40752775)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 403-412
-
-
Guha, R.1
Raghavan, P.2
Kumar, R.3
Tomkins, A.4
-
26
-
-
0028712918
-
Fuzzy dynamic programming
-
April
-
Alkan, M., Erkrmen, A.M., and Erkmen, L.: ' Fuzzy dynamic programming ', Proc. Seventh Mediterranean Electrotechnical Conf., April, 1994, 2, p. 732-726
-
(1994)
Proc. Seventh Mediterranean Electrotechnical Conf.
, vol.2
, pp. 732-726
-
-
Alkan, M.1
Erkrmen, A.M.2
Erkmen, L.3
-
27
-
-
0346636333
-
Decision-making in a fuzzy environment
-
10.1287/mnsc.17.4.B141 0025-1909
-
Bellman, R.E., and Zadeh, L.A.: ' Decision-making in a fuzzy environment ', Manage. Sci., 1970, 17, p. pp. B141-B164 10.1287/mnsc.17.4.B141 0025-1909
-
(1970)
Manage. Sci.
, vol.17
-
-
Bellman, R.E.1
Zadeh, L.A.2
-
28
-
-
58149089608
-
Fuzzy dynamic programming based trusted routing decision in mobile ad hoc networks
-
October, 7-9
-
Qin, Z.W., Jia, Z.P., and Chen, X.H.: ' Fuzzy dynamic programming based trusted routing decision in mobile ad hoc networks ', Proc. Fifth IEEE Int. Symp. on Embedded Computing (SEC), October, 7-9, 2008, p. 180-185
-
(2008)
Proc. Fifth IEEE Int. Symp. on Embedded Computing (SEC)
, pp. 180-185
-
-
Qin, Z.W.1
Jia, Z.P.2
Chen, X.H.3
-
29
-
-
58149096454
-
A distributed medium access protocol for wireless LANs
-
10.1109/ACSSC.1994.471452
-
Khayata, R.E., Puig, C.M., and Zweig, J.M.: ' A distributed medium access protocol for wireless LANs ', Signals Syst. Comput., 1994, 1, p. 238-242 10.1109/ACSSC.1994.471452
-
(1994)
Signals Syst. Comput.
, vol.1
, pp. 238-242
-
-
Khayata, R.E.1
Puig, C.M.2
Zweig, J.M.3
-
30
-
-
82455165563
-
-
accessed September
-
http://www.isi.edu/nsnam/ns/, accessed September 2009
-
(2009)
-
-
-
32
-
-
82455165560
-
The medium access control sublayer
-
Tanenbaum, A.S., 4th (Prentice-Hall)
-
Tanenbaum, A.S.: ' The medium access control sublayer ', Tanenbaum, A.S., Computer networks, 4th (Prentice-Hall, 2002), p. 251-270
-
(2002)
Computer Networks
, pp. 251-270
-
-
Tanenbaum, A.S.1
-
33
-
-
3042802118
-
The node distribution of the random waypoint mobility model for wireless ad hoc networks
-
10.1109/TMC.2003.1233531
-
Bettstetter, C., Resta, G., and Santi, P.: ' The node distribution of the random waypoint mobility model for wireless ad hoc networks ', IEEE Trans. Mobile Comput., 2003, 2, (3), p. 257-269 10.1109/TMC.2003.1233531
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.3
, pp. 257-269
-
-
Bettstetter, C.1
Resta, G.2
Santi, P.3
-
34
-
-
51849106949
-
A simple trust model for on-demand routing in mobile ad hoc networks
-
Griffiths, N., Jhumka, A., Dawson, A., and Myers, R.: ' A simple trust model for on-demand routing in mobile ad hoc networks ', Proc. Symp. on Intelligent Distributed Computing (IDC 2008), 2008, p. 105-114
-
(2008)
Proc. Symp. on Intelligent Distributed Computing (IDC 2008)
, pp. 105-114
-
-
Griffiths, N.1
Jhumka, A.2
Dawson, A.3
Myers, R.4
-
35
-
-
78650394299
-
Trust-based on-demand multi path routing in mobile ad hoc networks
-
Li, X., Jia, Z., Zhang, P., Zhang, R., and Wang, H.: ' Trust-based on-demand multi path routing in mobile ad hoc networks ', IET Special Issue on Multi-Agent Distrib. Inf. Secur., 2010, 4, (4), p. 212-232
-
(2010)
IET Special Issue on Multi-Agent Distrib. Inf. Secur.
, vol.4
, Issue.4
, pp. 212-232
-
-
Li, X.1
Jia, Z.2
Zhang, P.3
Zhang, R.4
Wang, H.5
-
36
-
-
84947273682
-
The Sybil attack
-
Cambridge, MA, USA, March
-
Douceur, J.R.: ' The Sybil attack ', Proc. Int. Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, March, 2002, p. 251-260
-
(2002)
Proc. Int. Workshop on Peer-to-Peer Systems
, pp. 251-260
-
-
Douceur, J.R.1
-
37
-
-
78650344642
-
-
Cheng, X.Y., Li, D.Y., 1st (Springer)
-
Pirzada, A.A., and McDonald, C.: ' Reliable routing in ad hoc networks using direct trust mechanisms ', Cheng, X.Y., Li, D.Y., Advances in ad hoc and sensor networks, 1st (Springer, 2006), p. 122-160
-
(2006)
Reliable Routing in Ad Hoc Networks Using Direct Trust Mechanisms, Advances in Ad Hoc and Sensor Networks
, pp. 122-160
-
-
Pirzada, A.A.1
McDonald, C.2
|