-
1
-
-
0003247337
-
Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations
-
Jan.
-
S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations," RFC 2501, Jan. 1999.
-
(1999)
RFC
, vol.2501
-
-
Corson, S.1
Macker, J.2
-
2
-
-
0023139974
-
The DARPA packet radio network protocols
-
Jan.
-
J. Jubin and J. Tornow, "The DARPA Packet Radio Network Protocols," Proc. IEEE, vol. 75, no. 1, Jan. 1987, pp. 21-32.
-
(1987)
Proc. IEEE
, vol.75
, Issue.1
, pp. 21-32
-
-
Jubin, J.1
Tornow, J.2
-
3
-
-
84857818590
-
ARL advanced telecommunication and information distribution research program (ATIRP)
-
June 2001
-
A. J. Tardiff and J.W. Gowens, Editors, "ARL Advanced Telecommunication and Information Distribution Research Program (ATIRP)," Final Report, 1996-2001, June 2001.
-
(1996)
Final Report
-
-
Tardiff, A.J.1
Gowens, J.W.2
-
4
-
-
3042598878
-
OLSR performance measurement in a military mobile ad hoc network
-
T. Plesse, J. Lecomte, C. Adjih, M. Badel, P. Jacquet, A. Laouiti, P. Minet, P. Muhlethaler, and A. Plakoo, "OLSR Performance Measurement in a Military Mobile Ad Hoc Network," Proc. 24th Int'l Conf. on Distributed Computing Systems, 2004, pp. 704-709.
-
(2004)
Proc. 24th Int'l Conf. on Distributed Computing Systems
, pp. 704-709
-
-
Plesse, T.1
Lecomte, J.2
Adjih, C.3
Badel, M.4
Jacquet, P.5
Laouiti, A.6
Minet, P.7
Muhlethaler, P.8
Plakoo, A.9
-
5
-
-
0003552195
-
-
Feb., Russell Sage Foundation Series on Trust, New York
-
K. S. Cook (editor), Trust in Society, vol. 2, Feb. 2003, Russell Sage Foundation Series on Trust, New York.
-
(2003)
Trust in Society
, vol.2
-
-
Cook, K.S.1
-
6
-
-
0029700344
-
Decentralized trust management
-
6-8 May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. IEEE Symposium on Security and Privacy, 6-8 May, 1996, pp. 164-173.
-
(1996)
Proc. IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
0842289235
-
Bootstrapping security associations for routing in mobile ad hoc networks
-
San Francisco, CA, Dec.
-
R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, "Bootstrapping Security Associations for Routing in Mobile Ad Hoc Networks," Proc. IEEE GLOBECOM, San Francisco, CA, Dec. 2003, pp.1511-1515.
-
(2003)
Proc. IEEE GLOBECOM
, pp. 1511-1515
-
-
Bobba, R.B.1
Eschenauer, L.2
Gligor, V.3
Arbaugh, W.4
-
8
-
-
35048850522
-
On trust establishment in mobile ad hoc networks
-
Cambridge, U.K., Apr.
-
L. Eschenauer, V. D. Gligor, and J. Baras, "On Trust Establishment in Mobile Ad Hoc Networks," Proc. 10th Int'l Security Protocols Workshop, Cambridge, U.K., Apr. 2002, vol. 2845, pp. 47-66.
-
(2002)
Proc. 10th Int'l Security Protocols Workshop
, vol.2845
, pp. 47-66
-
-
Eschenauer, L.1
Gligor, V.D.2
Baras, J.3
-
10
-
-
24944461245
-
Trust management survey
-
P. Herrmann et al. (Eds.), Lecture Notes in Computer Science
-
S. Ruhomaa and L. Kutvonen, "Trust Management Survey," P. Herrmann et al. (Eds.), iTrust 2005, Lecture Notes in Computer Science, vol. 3477, pp. 77-92.
-
(2005)
ITrust
, vol.3477
, pp. 77-92
-
-
Ruhomaa, S.1
Kutvonen, L.2
-
11
-
-
34250181031
-
Reputation management survey
-
10-13 Apr., Vienna, Austria
-
S. Ruhomaa, L. Kutvonen, and E. Koutrouli, "Reputation Management Survey," 2nd Int'l Conf. on Availability, Reliability, and Security, 10-13 Apr. 2007, Vienna, Austria, pp. 103-111.
-
(2007)
2nd Int'l Conf. on Availability, Reliability, and Security
, pp. 103-111
-
-
Ruhomaa, S.1
Kutvonen, L.2
Koutrouli, E.3
-
12
-
-
0009481412
-
A survey of trust in internet applications
-
T. Grandison and M. Sloman, "A Survey of Trust in Internet Applications," IEEE Commun. Surveys and Tutorials, vol. 3, no. 4, pp. 2-16, 2000.
-
(2000)
IEEE Commun. Surveys and Tutorials
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
13
-
-
79957699559
-
Towards trust-based cognitive networks: A survey of trust management for mobile ad hoc networks
-
Washington D.C. 15-17 June
-
J. H. Cho and A. Swami, "Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks," 14th Int'l Command and Control Research and Technology Symposium, Washington D.C. 15-17 June 2009.
-
(2009)
14th Int'l Command and Control Research and Technology Symposium
-
-
Cho, J.H.1
Swami, A.2
-
14
-
-
84857859118
-
-
Merriam Webster's Dictionary [Online]
-
Merriam Webster's Dictionary [Online]: http://www.merriamwebster.com/ dictionary/trust%5B1%5D.
-
-
-
-
17
-
-
33745456457
-
Toward a decentralized trust-based access control system for dynamic collaboration
-
15-17 June, West Point, NY
-
W. J. Adams, N. J. Davis, "Toward a Decentralized Trust-based Access Control System for Dynamic Collaboration," Proc. 6th Annual IEEE SMC Information Assurance Workshop, 15-17 June, 2005, West Point, NY, pp. 317-324.
-
(2005)
Proc. 6th Annual IEEE SMC Information Assurance Workshop
, pp. 317-324
-
-
Adams, W.J.1
Davis, N.J.2
-
19
-
-
0036200608
-
The trust paradox: A survey of economic inquiries into the nature of trust and trustworthiness
-
H. S. James, "The Trust Paradox: A Survey of Economic Inquiries into the Nature of Trust and Trustworthiness," Journal of Economic Behavior and Organization, vol. 47, no. 3, 2002.
-
(2002)
Journal of Economic Behavior and Organization
, vol.47
, Issue.3
-
-
James, H.S.1
-
20
-
-
0035508757
-
Game theory and the design of self-configuring, adaptive wireless networks
-
Nov.
-
A. B. MacKenzie and S. B. Wicker, "Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks," IEEE Commun. Mag., vol. 39, no. 11, pp. 126-131, Nov. 2001.
-
(2001)
IEEE Commun. Mag.
, vol.39
, Issue.11
, pp. 126-131
-
-
MacKenzie, A.B.1
Wicker, S.B.2
-
21
-
-
0019480612
-
The evolution of cooperation
-
March
-
R. Axelrod, "The Evolution of Cooperation," Science, vol. 211, no. 4489, pp. 1390-1396, March 1981.
-
(1981)
Science
, vol.211
, Issue.4489
, pp. 1390-1396
-
-
Axelrod, R.1
-
22
-
-
67650660211
-
Trust management for secure information flows
-
Alexandria, VA, Oct.
-
M. Srivatsa, S. Balfe, K. G. Paterson, and P. Rohatgi, "Trust Management for Secure Information Flows," Proc. 15th ACM Conf. on Computer and Communications Security, Alexandria, VA, Oct. 2008, pp. 175-188.
-
(2008)
Proc. 15th ACM Conf. on Computer and Communications Security
, pp. 175-188
-
-
Srivatsa, M.1
Balfe, S.2
Paterson, K.G.3
Rohatgi, P.4
-
24
-
-
84857857240
-
Olli lagerspetz: Trust. The tacit demand
-
Dec., Published Springer Netherlands
-
B. Lahno, "Olli Lagerspetz: Trust. The Tacit Demand," Ethical Theory and Moral Practice, vol. 2, no. 4, pp. 433-435, Dec. 1999, Published Springer Netherlands.
-
(1999)
Ethical Theory and Moral Practice
, vol.2
, Issue.4
, pp. 433-435
-
-
Lahno, B.1
-
25
-
-
84857874463
-
-
16 Sept. [Online], (sociology)
-
Wikipedia-Trust in Social Science, 16 Sept. 2009 [Online]: http://en.wikipedia.org/wiki/Trust (sociology)
-
(2009)
Wikipedia-Trust in Social Science
-
-
-
27
-
-
11744348112
-
The street-level epistemology of trust
-
R. Hardin, "The Street-Level Epistemology of Trust," Politics and Society, vol. 21, no. 4, 1993, pp. 505-529.
-
(1993)
Politics and Society
, vol.21
, Issue.4
, pp. 505-529
-
-
Hardin, R.1
-
28
-
-
58149405986
-
Interpersonal trust, trustworthiness, and gullibility
-
Jan.
-
J. B. Rotter, "Interpersonal Trust, Trustworthiness, and Gullibility," American Psychologist, vol. 35, no. 1, Jan. 1980, pp. 1-7.
-
(1980)
American Psychologist
, vol.35
, Issue.1
, pp. 1-7
-
-
Rotter, J.B.1
-
29
-
-
77957974589
-
The meanings of trust Carlson school of management, University of Minnesota
-
D. McKnight and N. Chevany, "The Meanings of Trust," Carlson School of Management, University of Minnesota, Technical Report TR 94-04, 1996.
-
(1996)
Technical Report TR 94-04
-
-
McKnight, D.1
Chevany, N.2
-
30
-
-
34247525112
-
An integrative model of organizational trust: Past, present, and future
-
F. D. Schoorman, R. C. Mayer, and J. H. Davis, "An Integrative Model of Organizational Trust: Past, Present, and Future," Academy of Management Review, vol. 31, no. 2, 2007, pp. 344-354.
-
(2007)
Academy of Management Review
, vol.31
, Issue.2
, pp. 344-354
-
-
Schoorman, F.D.1
Mayer, R.C.2
Davis, J.H.3
-
31
-
-
85010007963
-
Trust in automation: Designing for appropriate reliance
-
Spring
-
J. D. Lee and K. A. See, "Trust in Automation: Designing for Appropriate Reliance," Human Factors, vol. 46, no. 1, Spring 2004, pp. 50-80.
-
(2004)
Human Factors
, vol.46
, Issue.1
, pp. 50-80
-
-
Lee, J.D.1
See, K.A.2
-
32
-
-
0031171736
-
Humans and automation: Use, misuse, disuse, abuse
-
R. Parasuraman, "Humans and Automation: Use, Misuse, Disuse, Abuse," Human Factors, vol. 39, no. 2, 1997, pp. 230-253.
-
(1997)
Human Factors
, vol.39
, Issue.2
, pp. 230-253
-
-
Parasuraman, R.1
-
33
-
-
19944433808
-
The pudding of trust
-
S. Staab (Editor), "The Pudding of Trust," IEEE Intelligent Systems, vol. 19, no. 5, pp. 74-88, 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.5
, pp. 74-88
-
-
Staab, S.1
-
34
-
-
70749134483
-
Toward a human trust model for mobile ad-hoc networks
-
5-7 May, Cambridge University, Cambridge, UK
-
L. Capra, "Toward a Human Trust Model for Mobile Ad-hoc Networks," Proc. 2nd UK-UbiNet Workshop, 5-7 May 2004, Cambridge University, Cambridge, UK.
-
(2004)
Proc. 2nd UK-UbiNet Workshop
-
-
Capra, L.1
-
35
-
-
33947387917
-
Trust management in distributed systems
-
Feb.
-
H. Li and M. Singhal, "Trust Management in Distributed Systems," Computers, vol. 40, no.2, Feb. 2007, pp. 45-53.
-
(2007)
Computers
, vol.40
, Issue.2
, pp. 45-53
-
-
Li, H.1
Singhal, M.2
-
36
-
-
35248893687
-
Trust establishment in ad hoc and sensor networks
-
Samos, Greece, 31 Aug.-1 Sep. Springer
-
E. Aivaloglou, S. Gritxalis, and C. Skianis, "Trust Establishment in Ad Hoc and Sensor Networks," Proc. 1st Int'l Workshop on Critical Information Infrastructure Security, Lecture Notes in Computer Science,vol. 4347, pp. 179-192, Samos, Greece, 31 Aug.-1 Sep. 2006, Springer.
-
(2006)
Proc. 1st Int'l Workshop on Critical Information Infrastructure Security, Lecture Notes in Computer Science
, vol.4347
, pp. 179-192
-
-
Aivaloglou, E.1
Gritxalis, S.2
Skianis, C.3
-
37
-
-
50149083937
-
Computing with trust: Definition, properties, and algorithms
-
Baltimore, MD, 28 Aug.-1 Sep.
-
J. Golbeck, "Computing with Trust: Definition, Properties, and Algorithms," Securecomm and Workshops-Security and Privacy for Emerging Areas in Communications Networks, Baltimore, MD, 28 Aug.-1 Sep. 2006, pp. 1-7.
-
(2006)
Securecomm and Workshops-Security and Privacy for Emerging Areas in Communications Networks
, pp. 1-7
-
-
Golbeck, J.1
-
38
-
-
33845467053
-
Inferring trust relationships in webbased social networks
-
Nov.
-
J. Golbeck and J. Hendler, "Inferring Trust Relationships in Webbased Social Networks," ACM Transactions in Internet Technology, Nov. 2006, vol. 6, no. 4, pp. 497-529.
-
(2006)
ACM Transactions in Internet Technology
, vol.6
, Issue.4
, pp. 497-529
-
-
Golbeck, J.1
Hendler, J.2
-
40
-
-
0034309389
-
Adding security and trust to multiagent systems
-
Oct.
-
H. C. Wong, K. P. Sycara, "Adding Security and Trust to Multiagent Systems," Applied Artificial Intelligence, vol. 14, no. 9, pp. 927-941, Oct. 2000.
-
(2000)
Applied Artificial Intelligence
, vol.14
, Issue.9
, pp. 927-941
-
-
Wong, H.C.1
Sycara, K.P.2
-
41
-
-
35048832333
-
Analyzing the relationship between risk and trust
-
LNCS, Springer-Verlag
-
A. Josang and S. LoPresti, "Analyzing the Relationship between Risk and Trust," Proc. 2nd Int'l Conf. Trust Management, LNCS, Springer-Verlag, 2004, pp. 135-145.
-
(2004)
Proc. 2nd Int'l Conf. Trust Management
, pp. 135-145
-
-
Josang, A.1
LoPresti, S.2
-
42
-
-
34548173266
-
Why trust is not proportional to risk?
-
10-13 Apr., Vienna, Austria
-
B. Solhaug, D. Elgesem, and K. Stolen, "Why Trust is not proportional to Risk?" Proc. 2nd Int'l Conf. on Availability, Reliability, and Security, 10-13 Apr. 2007, Vienna, Austria, pp. 11-18.
-
(2007)
Proc. 2nd Int'l Conf. on Availability, Reliability, and Security
, pp. 11-18
-
-
Solhaug, B.1
Elgesem, D.2
Stolen, K.3
-
43
-
-
11344292955
-
Defining uncertainty: A conceptual basis for uncertainty management in model-based decision support
-
March
-
W. E. Walker, P. Harremoes, J. Rotmans, J. P. van der Sluijs, M. B. A. van Asselt, P. Janssen, and M.P. Krayer von Krauss, "Defining Uncertainty: A Conceptual Basis for Uncertainty Management in Model-based Decision Support," Integrated Assessment, vol. 4, no. 1, March 2003, pp. 5-17.
-
(2003)
Integrated Assessment
, vol.4
, Issue.1
, pp. 5-17
-
-
Walker, W.E.1
Harremoes, P.2
Rotmans, J.3
Van Der Sluijs, J.P.4
Van Asselt, M.B.A.5
Janssen, P.6
Krayer Von Krauss, M.P.7
-
44
-
-
28444452986
-
Calculating a node's reputation in a mobile ad hoc network
-
Phoenix, AX, 7-9 April
-
W. J. Adams, G. C. Hadjichristofi and N. J. Davis, "Calculating a Node's Reputation in a Mobile Ad Hoc Network," Proc. 24th IEEE Int'l Performance Computing and Communications Conference, Phoenix, AX, 7-9 April 2005, pp. 303-307.
-
(2005)
Proc. 24th IEEE Int'l Performance Computing and Communications Conference
, pp. 303-307
-
-
Adams, W.J.1
Hadjichristofi, G.C.2
Davis, N.J.3
-
46
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Feb.
-
Y. L. Sun, W. Yu, Z. Han, and K. J. R. Liu, "Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, Feb. 2006, pp. 305-317.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
47
-
-
29844435578
-
A localized trust management scheme for ad hoc networks
-
March
-
C. R. Davis, "A Localized Trust Management Scheme for Ad Hoc Networks," Proc. 3rd Int'l Conf. on Networking, March 2004, pp. 671-675.
-
(2004)
Proc. 3rd Int'l Conf. on Networking
, pp. 671-675
-
-
Davis, C.R.1
-
48
-
-
33747771909
-
Cognitive networks
-
8-11 Nov.
-
R. W. Thomas, L. A. DaSilva, and A.B. MacKenzie, "Cognitive Networks," Proc. 1st IEEE Int'l Symposium on New Frontiers in Dynamic Spectrum Access Networks, 8-11 Nov. 2005, pp. 352-360.
-
(2005)
Proc. 1st IEEE Int'l Symposium on New Frontiers in Dynamic Spectrum Access Networks
, pp. 352-360
-
-
Thomas, R.W.1
DaSilva, L.A.2
MacKenzie, A.B.3
-
49
-
-
5044222209
-
A dynamic trust model for mobile ad hoc networks
-
Sushou, China, 26-28 May
-
Z. Liu, A. W. Joy, and R. A. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," Proc. 10th IEEE Int'l Workshop on Future Trends of Distributed Computing Systems, Sushou, China, 26-28 May 2004, pp. 80-85.
-
(2004)
Proc. 10th IEEE Int'l Workshop on Future Trends of Distributed Computing Systems
, pp. 80-85
-
-
Liu, Z.1
Joy, A.W.2
Thompson, R.A.3
-
50
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
Feb.
-
G. Theodorakopoulos and J. S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, Feb. 2006.
-
(2006)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.2
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
51
-
-
34547277464
-
An objective trust management framework for mobile ad hoc networks
-
22-25 Apr.
-
R. Li, J. Li, P. Liu, H. H. Chen, "An Objective Trust Management Framework for Mobile Ad Hoc Networks," Proc. IEEE 65th Vehicular Technology Conf., 22-25 Apr. 2007, pp. 56-60.
-
(2007)
Proc. IEEE 65th Vehicular Technology Conf.
, pp. 56-60
-
-
Li, R.1
Li, J.2
Liu, P.3
Chen, H.H.4
-
52
-
-
42649129419
-
Future trust management framework for mobile ad hoc networks: Security in mobile ad hoc networks
-
Apr.
-
J. Li, R. Li, and J. Kato, "Future Trust Management Framework for Mobile Ad Hoc Networks: Security in Mobile Ad Hoc Networks," IEEE Commun. Mag., vol. 46, no. 4, Apr. 2008, pp. 108-114.
-
(2008)
IEEE Commun. Mag.
, vol.46
, Issue.4
, pp. 108-114
-
-
Li, J.1
Li, R.2
Kato, J.3
-
53
-
-
48349130802
-
Adaptive trust management in MANETs
-
15-19 Dec.
-
F. Yunfang, "Adaptive Trust Management in MANETs," Proc. 2007 Int'l Conf. on Computational Intelligence and Security, Harbin, China, 15-19 Dec. 2007, pp. 804-808.
-
(2007)
Proc. 2007 Int'l Conf. on Computational Intelligence and Security, Harbin, China
, pp. 804-808
-
-
Yunfang, F.1
-
54
-
-
34547610382
-
Secure routing for mobile ad hoc networks
-
P. G. Argyroudis and D. O'Mahony, "Secure Routing for Mobile Ad Hoc Networks," IEEE Commun. Surveys and Tutorials, vol. 7, no. 3, pp. 2-21, 2005.
-
(2005)
IEEE Commun. Surveys and Tutorials
, vol.7
, Issue.3
, pp. 2-21
-
-
Argyroudis, P.G.1
O'Mahony, D.2
-
55
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
D. Djenouri, L. Khelladi and N. Badache, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," IEEE Commun. Surveys and Tutorials, vol. 7, no. 4, pp. 2-28, 2005.
-
(2005)
IEEE Commun. Surveys and Tutorials
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, N.3
-
56
-
-
85029731561
-
A survey of attacks and countermeasures in mobile ad hoc networks
-
Springer U.S
-
B. Wu, J. Chen, J. Wu, and M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Wireless Network Security-Signals and Communication Technology, Part II, 2007, pp. 103-135, Springer U.S.
-
(2007)
Wireless Network Security-Signals and Communication Technology, Part II
, pp. 103-135
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
57
-
-
50049090997
-
In-band wormholes and countermeasures in OLSR networks
-
Baltimore, MD, 28 Aug.-1 Sept.
-
P. Kruus, D. Sterne, R. Gopaul, M. Heyman, B. Rivera, P. Budulas, B. Luu, T. Johnson, N. Ivanic, and G. Lawler, "In-Band Wormholes and Countermeasures in OLSR Networks," Securecomm and Workshops 2006, Baltimore, MD, 28 Aug.-1 Sept. 2006, pp. 1-11.
-
(2006)
Securecomm and Workshops 2006
, pp. 1-11
-
-
Kruus, P.1
Sterne, D.2
Gopaul, R.3
Heyman, M.4
Rivera, B.5
Budulas, P.6
Luu, B.7
Johnson, T.8
Ivanic, N.9
Lawler, G.10
-
58
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
Anchorage, AK, 6-12 May
-
R. Maheshwari and S. R. Jie Gao Das, "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information," Proc. 26th IEEE Int'l Conf. on Computer Communications, Anchorage, AK, 6-12 May 2007, pp. 107-115.
-
(2007)
Proc. 26th IEEE Int'l Conf. on Computer Communications
, pp. 107-115
-
-
Maheshwari, R.1
Jie Gao Das, S.R.2
-
59
-
-
48649098942
-
Countering false accusations and collusion in the detection of in-band wormholes
-
Miami Beach, FL, Dec.
-
D. Sterne, G. Lawler, R. Gopaul, B. Rivera, K. Marcus, and P. Kruus, "Countering False Accusations and Collusion in the Detection of In-Band Wormholes," Proc. 23rd Annual Computer Security Applications Conf., Miami Beach, FL, Dec. 2007, pp. 243-256.
-
(2007)
Proc. 23rd Annual Computer Security Applications Conf.
, pp. 243-256
-
-
Sterne, D.1
Lawler, G.2
Gopaul, R.3
Rivera, B.4
Marcus, K.5
Kruus, P.6
-
60
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May
-
Y. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy, vol. 2, no. 3, May 2004, pp. 28-39.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.1
Perrig, A.2
-
61
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, AK, USA, 11 May
-
C. Kardof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Proc. 1st IEEE Int'l Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, 11 May 2003, pp. 113-117.
-
(2003)
Proc. 1st IEEE Int'l Workshop on Sensor Network Protocols and Applications
, pp. 113-117
-
-
Kardof, C.1
Wagner, D.2
-
62
-
-
30344461584
-
The denial-of-service dance
-
Nov./Dec.
-
P. L. Campbell, "The Denial-of-Service Dance," IEEE Security and Privacy, vol. 3, no. 6, pp. 34-40, Nov./Dec. 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.6
, pp. 34-40
-
-
Campbell, P.L.1
-
63
-
-
24744469215
-
A framework for key management in a mobile ad hoc network
-
Tiejun Huang, China, 4-6 April
-
G. C. Hadjichristofi, W. J. Adams, and N. J. Davis, "A Framework for Key Management in a Mobile Ad Hoc Network," Proc. Int'l Conf. on Information Technology: Coding and Computing, Tiejun Huang, China, 4-6 April 2005, vol. 2, pp. 568-573.
-
(2005)
Proc. Int'l Conf. on Information Technology: Coding and Computing
, vol.2
, pp. 568-573
-
-
Hadjichristofi, G.C.1
Adams, W.J.2
Davis, N.J.3
-
64
-
-
33744991057
-
Trust evaluation based security solutions in ad hoc networks
-
Gjovik, Norway, 15-17 Oct.
-
Z. Yan, P. Zhang, and T. Virtanen, "Trust Evaluation Based Security Solutions in Ad Hoc Networks," Proc. 7th Nordic Workshop on Security IT Systems, Gjovik, Norway, 15-17 Oct. 2003.
-
(2003)
Proc. 7th Nordic Workshop on Security IT Systems
-
-
Yan, Z.1
Zhang, P.2
Virtanen, T.3
-
65
-
-
0002101577
-
Reputation systems
-
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation Systems," Communications of the ACM, vol. 43, no. 12, pp. 45-48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
66
-
-
78651538701
-
Reliable routing against selective packet drop attack in DSR based manet
-
Aug.
-
N. Bhalaji and A. Shanmugam, "Reliable Routing against Selective Packet Drop Attack in DSR based MANET," Journal of Software, vol. 4, no. 6, Aug. 2009, pp. 536-543.
-
(2009)
Journal of Software
, vol.4
, Issue.6
, pp. 536-543
-
-
Bhalaji, N.1
Shanmugam, A.2
-
67
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug.
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. 6th Annual ACM/IEEE Mobile Computing and Networking, Boston, MA, Aug. 2000, pp.255-265.
-
(2000)
Proc. 6th Annual ACM/IEEE Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
68
-
-
0037885580
-
Node bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands, Spain, Jan.
-
S. Buchegger and J.-Y. Le Boudec, "Node Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks," Proc. IEEE 10th Euromicro Workshop on Parallel, Distributed, and Network-based Processing, pp. 403-410, Canary Islands, Spain, Jan. 2002.
-
(2002)
Proc. IEEE 10th Euromicro Workshop on Parallel, Distributed, and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
69
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks
-
Lausanne, CH, 9-11 June
-
S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks," Proc. 3rd IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, CH, 9-11 June 2002, pp. 226-236.
-
(2002)
Proc. 3rd IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
70
-
-
0036452448
-
Context-aware detection of selfish nodes in DSR based ad hoc networks
-
Taipeh, Taiwan
-
K. Paul and D. Westhoff, "Context-Aware Detection of Selfish Nodes in DSR based Ad Hoc Networks," Proc. IEEE Globecom Conf., Taipeh, Taiwan, 2002.
-
(2002)
Proc. IEEE Globecom Conf.
-
-
Paul, K.1
Westhoff, D.2
-
71
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Porotoz, Slovenia
-
P. Michiardi and R. Molva, "CORE: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," The 6th IFIP Conf. on Security Communications, and Multimedia, Porotoz, Slovenia, 2002.
-
(2002)
The 6th IFIP Conf. on Security Communications, and Multimedia
-
-
Michiardi, P.1
Molva, R.2
-
72
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
-
March
-
Q. He, D. Wu, and P. Khosla, "SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-Hoc Networks," Proc. IEEE Wireless Communications and Networking Conf., vol. 2, pp. 825-830, March 2004.
-
(2004)
Proc. IEEE Wireless Communications and Networking Conf.
, vol.2
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
73
-
-
77953097829
-
Trust-based adaptive on demand ad hoc routing protocol
-
Huntsville, Alabama
-
R. K. Nekkanti and C. Lee, "Trust-based Adaptive On Demand Ad Hoc Routing Protocol," Proc. 42th Annual ACM Southeast Regional Conf., Huntsville, Alabama, 2004, pp. 88-93.
-
(2004)
Proc. 42th Annual ACM Southeast Regional Conf.
, pp. 88-93
-
-
Nekkanti, R.K.1
Lee, C.2
-
74
-
-
11244296240
-
A trust model based routing protocol for secure ad hoc networks
-
Bug Sky, Montana, 6-13 Mar.
-
X. Li, M. R. Lyu and J. Liu, "A Trust Model Based Routing Protocol for Secure Ad Hoc Networks," Proc. 2004 IEEE Aerospace Conf., Bug Sky, Montana, 6-13 Mar. 2004, vol. 2, pp. 1286-1295.
-
(2004)
Proc. 2004 IEEE Aerospace Conf.
, vol.2
, pp. 1286-1295
-
-
Li, X.1
Lyu, M.R.2
Liu, J.3
-
75
-
-
21144452079
-
Collaborative trust-based routing in multi-hop ad hoc networks
-
Athens, Greece, 9-14 May
-
N. Pisinou, T. Ghosh and K. Makki, "Collaborative Trust-based Routing in Multi-hop Ad Hoc Networks," Proc. 3rd Int'l IFIP-TC06 Networking Conf., Lecture Notes in Computer Science, Athens, Greece, 9-14 May 2004, vol. 3042, pp. 1446-1451.
-
(2004)
Proc. 3rd Int'l IFIP-TC06 Networking Conf., Lecture Notes in Computer Science
, vol.3042
, pp. 1446-1451
-
-
Pisinou, N.1
Ghosh, T.2
Makki, K.3
-
77
-
-
29844453185
-
Towards designing a trust routing solution in mobile ad hoc networks
-
T. Ghosh, N. Pissinou, and K. Makki, "Towards Designing a Trust Routing Solution in Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 10, pp. 985-995, 2005.
-
(2005)
Mobile Networks and Applications
, vol.10
, pp. 985-995
-
-
Ghosh, T.1
Pissinou, N.2
Makki, K.3
-
78
-
-
33846981846
-
Local detection of selfish routing behavior in ad hoc networks
-
7-9 Dec.
-
B. Wang, S. Soltani, J. Shapiro, and P. Tab, "Local Detection of Selfish Routing Behavior in Ad Hoc Networks," Proc. 8th Int'l Symposium on Parallel Architectures, Algorithms and Networks , 7-9 Dec. 2005, pp. 392-399.
-
(2005)
Proc. 8th Int'l Symposium on Parallel Architectures, Algorithms and Networks
, pp. 392-399
-
-
Wang, B.1
Soltani, S.2
Shapiro, J.3
Tab, P.4
-
79
-
-
33745940320
-
Quantitative trust establishment framework for reliable data packet delivery in MANETs
-
Alexandria, VA, Nov. 7
-
C. Zouridaki, B. L. Mark, M. Hejmo and R. K. Thomas, "Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs," Proc. 3rd ACM Workshop on Security for Ad Hoc and Sensor Networks, Alexandria, VA, Nov. 7, 2005.
-
(2005)
Proc. 3rd ACM Workshop on Security for Ad Hoc and Sensor Networks
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
80
-
-
34547407799
-
Robust cooperative trust establishment for MANETs
-
Alexandria, VA, 30 Oct.
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "Robust Cooperative Trust Establishment for MANETs," Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, 30 Oct. 2006, pp. 23-34.
-
(2006)
Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 23-34
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
82
-
-
70450164574
-
A survey of secure mobile ad hoc routing protocols
-
L. Abusalah, A. Khokhar, and M. Guizani, "A Survey of Secure Mobile Ad Hoc Routing Protocols," IEEE Commun. Surveys and Tutorials, vol. 19, no. 4, pp.78-93, 2008.
-
(2008)
IEEE Commun. Surveys and Tutorials
, vol.19
, Issue.4
, pp. 78-93
-
-
Abusalah, L.1
Khokhar, A.2
Guizani, M.3
-
83
-
-
46749135273
-
A distributed trust mechanism for mobile ad hoc networks
-
20-23 Dec. Surathkal, India
-
J. Sen, P. Chowdhury, and I. Sengupta, "A Distributed Trust Mechanism for Mobile Ad Hoc Networks," Int'l Symposium on Ad Hoc and Ubiquitous Computing, 20-23 Dec. 2006. Surathkal, India, pp. 62-67.
-
(2006)
Int'l Symposium on Ad Hoc and Ubiquitous Computing
, pp. 62-67
-
-
Sen, J.1
Chowdhury, P.2
Sengupta, I.3
-
84
-
-
47049106826
-
An efficient scheme to motivate cooperation in mobile ad hoc networks
-
Athens, Greece, 19-25 June
-
S. Soltanali, S. Pirahesh, S. Niksefat, and M. Sabaei, "An Efficient Scheme to Motivate Cooperation in Mobile Ad Hoc Networks," Int'l Conf. on Networking and Services, Athens, Greece, 19-25 June 2007, pp. 98-103.
-
(2007)
Int'l Conf. on Networking and Services
, pp. 98-103
-
-
Soltanali, S.1
Pirahesh, S.2
Niksefat, S.3
Sabaei, M.4
-
85
-
-
47049091932
-
Trust and recommendations in mobile ad hoc networks
-
Athens, Greece, 19-25 June
-
V. Balakrishnnan, V. Varadharajan, U. K. Tupakula, and P. Lucs, "Trust and Recommendations in Mobile Ad Hoc Networks," Int'l Conf. on Networking and Services, Athens, Greece, 19-25 June 2007, pp. 64-69.
-
(2007)
Int'l Conf. on Networking and Services
, pp. 64-69
-
-
Balakrishnnan, V.1
Varadharajan, V.2
Tupakula, U.K.3
Lucs, P.4
-
86
-
-
38749146509
-
Analysis of a reputation system for mobile ad hoc networks with liars
-
Mar.
-
J. Mundinger and J. Le Boudec, "Analysis of a Reputation System for Mobile Ad Hoc Networks with Liars," Performance Evaluation, vol. 65, no. 3-4, pp. 212-226, Mar. 2008.
-
(2008)
Performance Evaluation
, vol.65
, Issue.3-4
, pp. 212-226
-
-
Mundinger, J.1
Le Boudec, J.2
-
87
-
-
63449117720
-
TSR: Trust-based secure MANET routing using HMMs
-
Vancouver, British Columbia, Canada, 27-28 Oct.
-
M. E. G. Moe, B. E. Helvik, and S. J. Knapskog, "TSR: Trust-based Secure MANET Routing using HMMs," Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, 27-28 Oct. 2008, pp. 83-90.
-
(2008)
Proc. 4th ACM Symposium on QoS and Security for Wireless and Mobile Networks
, pp. 83-90
-
-
Moe, M.E.G.1
Helvik, B.E.2
Knapskog, S.J.3
-
89
-
-
70749150776
-
Misbehavior detection using implicit trust relations in the AODV routing protocol
-
Vancouver, Canada, 29-31 Aug.
-
M. A. Ayachi, C. Bidan, T. Abbes, and A. Bouhoula, "Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol," 2009 Int'l Conf. on Computational Science and Engineering, Vancouver, Canada, vol. 2, 29-31 Aug. 2009, pp. 802-808.
-
(2009)
2009 Int'l Conf. on Computational Science and Engineering
, vol.2
, pp. 802-808
-
-
Ayachi, M.A.1
Bidan, C.2
Abbes, T.3
Bouhoula, A.4
-
90
-
-
70749153484
-
Trust-based countermeasures for securing OLSR protocol
-
Vancouver, Canada, 28-31 Aug.
-
A. Adnane, C. Bidan, R. T. de Sousa, "Trust-based Countermeasures for Securing OLSR Protocol," 2009 Int'l Conf. on Computational Science and Engineering, Vancouver, Canada, vol. 2, 28-31 Aug. 2009, pp. 745-752.
-
(2009)
2009 Int'l Conf. on Computational Science and Engineering
, vol.2
, pp. 745-752
-
-
Adnane, A.1
Bidan, C.2
De Sousa, R.T.3
-
92
-
-
29844441381
-
NTM-progressive trust negotiation in ad hoc networks
-
Dublin, Ireland, 27 Nov.
-
R. R. S. Verma, D. O'Mahony and H. Tewari, "NTM-Progressive Trust Negotiation in Ad Hoc Networks," Proc. 1st Joint IEI/IEE Symposium on Telecommunications Systems Research, Dublin, Ireland, 27 Nov. 2001.
-
(2001)
Proc. 1st Joint IEI/IEE Symposium on Telecommunications Systems Research
-
-
Verma, R.R.S.1
O'Mahony, D.2
Tewari, H.3
-
93
-
-
33646410469
-
Performance comparison of trust-based reactive routing protocols
-
June
-
A. A. Pirzada, C. McDonald, and A. Datta, "Performance Comparison of Trust-based Reactive Routing Protocols," IEEE Trans. Mobile Comput., vol. 5, no. 6, June 2006, pp. 695-710.
-
(2006)
IEEE Trans. Mobile Comput.
, vol.5
, Issue.6
, pp. 695-710
-
-
Pirzada, A.A.1
McDonald, C.2
Datta, A.3
-
95
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
Apr.
-
P. Albers, O. Camp, J.-M. Percher, B. Jouga, L. Me, R. Puttini, "Security in Ad Hoc Networks: A General Intrusion Detection Architecture Enhancing Trust Based Approaches", Proc. 1st Int'l Workshop on Wireless Information Systems, Apr. 2002, pp. 1-12.
-
(2002)
Proc. 1st Int'l Workshop on Wireless Information Systems
, pp. 1-12
-
-
Albers, P.1
Camp, O.2
Percher, J.-M.3
Jouga, B.4
Me, L.5
Puttini, R.6
-
96
-
-
84860703392
-
Cluster-based intrusion detection (CBID) architecture for mobile ad hoc networks
-
Gold Coast, Australia, 21-26 May
-
E. Ahmed, K. Samad and W. Mahmood, "Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks." AusCERT Asia Pacific Information Technology Security Conf., Gold Coast, Australia, 21-26 May 2006.
-
(2006)
AusCERT Asia Pacific Information Technology Security Conf.
-
-
Ahmed, E.1
Samad, K.2
Mahmood, W.3
-
97
-
-
2642587068
-
-
Technical Report, TCD-CS-2002-66, Trinity College Dublin
-
E. Gray, P. O'Connell, C. Jensen, a. Weber, J.-M. Seigneur, and C. Yong, "Towards a Framework for Assessing Trust-based Admission Control in Collaborative Ad Hoc Applications," Technical Report, TCD-CS-2002-66, Trinity College Dublin, 2002.
-
(2002)
Towards a Framework for Assessing Trust-based Admission Control in Collaborative Ad Hoc Applications
-
-
Gray, E.1
O'Connell, P.2
Jensen, C.3
Weber, A.4
Seigneur, J.-M.5
Yong, C.6
-
98
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
Dec.
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Trans. Netw., vol. 12, no. 6, Dec. 2004, pp. 1049-1063.
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
99
-
-
33745257035
-
Quantifying trust in mobile ad-hoc networks
-
18-21 April
-
M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, "Quantifying Trust in Mobile Ad-Hoc Networks," Proc. Int'l Conf. Integration of Knowledge Intensive Multi-Agent Systems, 18-21 April 2005, pp. 65-70.
-
(2005)
Proc. Int'l Conf. Integration of Knowledge Intensive Multi-Agent Systems
, pp. 65-70
-
-
Virendra, M.1
Jadliwala, M.2
Chandrasekaran, M.3
Upadhyaya, S.4
-
100
-
-
33646847482
-
On demand public key management for mobile ad hoc networks
-
May
-
R. Li, J. Li, P. Liu, and H. H. Chen, "On Demand Public Key Management for Mobile Ad Hoc Networks," Wiley's Wireless Communications and Mobile Computing, May 2006, vol. 6, no. 3, pp. 295-306.
-
(2006)
Wiley's Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 295-306
-
-
Li, R.1
Li, J.2
Liu, P.3
Chen, H.H.4
-
101
-
-
66149153135
-
Markov chain trust model for trust value analysis and key management in distributed multicast MANETs
-
May
-
B. J. Chang and S. L. Kuo, "Markov Chain Trust Model for Trust Value Analysis and Key Management in Distributed Multicast MANETs," IEEE Trans. Veh. Technol., vol. 58, no. 4, May 2009, pp. 1846-1863.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.4
, pp. 1846-1863
-
-
Chang, B.J.1
Kuo, S.L.2
-
102
-
-
38049003964
-
A survey of key management in ad hoc networks
-
A. Hegland, E. Winjum, S. F. Mjolsnes, C. Rong, O. Kure and P. Spilling, "A Survey of Key Management in Ad Hoc Networks," IEEE Commun. Surveys and Tutorials, vol. 8, no. 3, pp. 48-66, 2006.
-
(2006)
IEEE Commun. Surveys and Tutorials
, vol.8
, Issue.3
, pp. 48-66
-
-
Hegland, A.1
Winjum, E.2
Mjolsnes, S.F.3
Rong, C.4
Kure, O.5
Spilling, P.6
-
103
-
-
3042647171
-
Ant-based adaptive trust evidence distribution in MANET
-
Tokyo, Japan, 23-24 March
-
T. Jiang and J. S. Baras, "Ant-based Adaptive Trust Evidence Distribution in MANET," Proc. 2nd Int'l Conf. on Mobile Distributed Computing Systems Workshops, Tokyo, Japan, 23-24 March 2004, pp.588-593.
-
(2004)
Proc. 2nd Int'l Conf. on Mobile Distributed Computing Systems Workshops
, pp. 588-593
-
-
Jiang, T.1
Baras, J.S.2
-
104
-
-
14344264010
-
Cooperative games, phase transition on graphs and distributed trust in MANETs
-
Atlantis, Bahamas, 14-17 Dec.
-
J. S. Baras and T. Jiang, "Cooperative Games, Phase Transition on Graphs and Distributed Trust in MANETs," Proc. 43th IEEE Conf. on Decision and Control, Atlantis, Bahamas, 14-17 Dec. 2004, vol. 1, pp. 93-98.
-
(2004)
Proc. 43th IEEE Conf. on Decision and Control
, vol.1
, pp. 93-98
-
-
Baras, J.S.1
Jiang, T.2
-
105
-
-
63449141260
-
A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks
-
Vancouver, British Columbia, Canada
-
A. Boukerche and Y. Ren, "A Security Management Scheme using a Novel Computational Reputation Model for Wireless and Mobile Ad Hoc Networks," Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Vancouver, British Columbia, Canada, pp. 88-95, 2008.
-
(2008)
Proc. Int'l Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems
, pp. 88-95
-
-
Boukerche, A.1
Ren, Y.2
-
107
-
-
70749147824
-
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
-
Vancouver, Canada, 29-31 Aug.
-
J. H. Cho, A. Swami and I.R. Chen, "Modeling and Analysis of Trust Management for Cognitive Mission-driven Group Communication Systems in Mobile Ad Hoc Networks," 2009 Int'l Conf. on Computational Science and Engineering, vol. 2, Vancouver, Canada, 29-31 Aug. 2009, pp. 641-650.
-
(2009)
2009 Int'l Conf. on Computational Science and Engineering
, vol.2
, pp. 641-650
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
109
-
-
45749109010
-
Sybilguard: Defending against sybil attacks via social networks
-
June
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. D. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks," IEEE/ACM Trans. Netw., vol. 16, no. 3, June 2008, pp. 576-589.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.D.4
-
110
-
-
35948974761
-
Toward a gravitybased trust model for social networking systems
-
22-29 June
-
M. Maheswaran, H. C. Tang, and A. Ghunaim, "Toward a Gravitybased Trust Model for Social Networking Systems," Proc. 27th Int'l Conf. on Distributed Computing Systems Workshops, 22-29 June 2007, pp. 24-31.
-
(2007)
Proc. 27th Int'l Conf. on Distributed Computing Systems Workshops
, pp. 24-31
-
-
Maheswaran, M.1
Tang, H.C.2
Ghunaim, A.3
-
111
-
-
44049085117
-
A trust evaluation method based on logic and probability theory
-
Springer Boston
-
R. Kohlas, J. Jonczy, and R. Haenni, "A Trust Evaluation Method Based on Logic and Probability Theory," Trust Management II: IFIP Int'l Federation for Information Processing, vol. 263, 2008, Springer Boston.
-
(2008)
Trust Management II: IFIP Int'l Federation for Information Processing
, vol.263
-
-
Kohlas, R.1
Jonczy, J.2
Haenni, R.3
-
112
-
-
70749090738
-
Repcom: Towards reputation composition over peer-to-peer communities
-
Vancouver, Canada, 29-31 Aug. 2009
-
G. Yin, D. Shi, H. Wang, and M. Guo, "RepCom: Towards Reputation Composition over Peer-to-Peer Communities," 2009 Int'l Conf. on Computational Science and Engineering, vol. 2, Vancouver, Canada, 29-31 Aug. 2009, pp. 765-771.
-
2009 Int'l Conf. on Computational Science and Engineering
, vol.2
, pp. 765-771
-
-
Yin, G.1
Shi, D.2
Wang, H.3
Guo, M.4
-
113
-
-
70749131896
-
Multidimensional dynamic trust management for federated services
-
Vancouver, Canada, 29-31 Aug.
-
L. Boursas and W. Hommel, "Multidimensional Dynamic Trust Management for Federated Services," 2009 Int'l Conf. on Computational Science and Engineering, vol. 2, Vancouver, Canada, 29-31 Aug. 2009, pp.684-689.
-
(2009)
2009 Int'l Conf. on Computational Science and Engineering
, vol.2
, pp. 684-689
-
-
Boursas, L.1
Hommel, W.2
-
114
-
-
19944395899
-
Propagation of trust and distrust
-
New York, NY, 19-21 May
-
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, "Propagation of Trust and Distrust," Proc. 13th Int'l Conf. on World Wide Web, New York, NY, 19-21 May 2004, pp. 403-412.
-
(2004)
Proc. 13th Int'l Conf. on World Wide Web
, pp. 403-412
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
115
-
-
33750688177
-
Trust representation and aggregation in a distributed agent system
-
Boston, MA
-
Y. Wang and M. P. Singh, "Trust Representation and Aggregation in a Distributed Agent System," Proc. 21st National Conf. on Artificial Intelligence (AAAI), 2006, Boston, MA, pp. 1425-1430.
-
(2006)
Proc. 21st National Conf. on Artificial Intelligence (AAAI)
, pp. 1425-1430
-
-
Wang, Y.1
Singh, M.P.2
-
117
-
-
78650760549
-
SAT: Building new trust architecture for vehicular networks
-
Seattle, WA, 22 Aug.
-
X. Hong, D. Huang, M. Gerla, and Z. Cao, "SAT: Building New Trust Architecture for Vehicular Networks," ACM SIGCOMM 3rd Int'l Workshop on Mobility in the Evolving Internet Architecture, Seattle, WA, 22 Aug. 2008.
-
(2008)
ACM SIGCOMM 3rd Int'l Workshop on Mobility in the Evolving Internet Architecture
-
-
Hong, X.1
Huang, D.2
Gerla, M.3
Cao, Z.4
-
118
-
-
84857858813
-
-
U. S. Army Research Laboratory Program Announcement for Network Science CTA [Online], 23 Jan
-
U. S. Army Research Laboratory, Program Announcement for Network Science CTA, [Online]: http://www.arl.army.mil/www/DownloadedInternetPages/CurrentPages/ CTA/Documents/NSCTAFINAL23JAN09.pdf, 23 Jan. 2009.
-
(2009)
-
-
-
119
-
-
84857868675
-
A proposal for trust management in coalition environments
-
14 Dec.
-
D. Agrawal, H. Chivers, J. Clark, C. Jutla, and J. McDermid, "A Proposal for Trust Management in Coalition Environments," 26th Army Science Conf., 14 Dec. 2008.
-
(2008)
26th Army Science Conf.
-
-
Agrawal, D.1
Chivers, H.2
Clark, J.3
Jutla, C.4
McDermid, J.5
-
120
-
-
61449159887
-
Dynamic trust management
-
Feb.
-
M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J.M. Smith, A.D. Keromytis, and W. Lee, "Dynamic Trust Management," Computer, vol. 42, no. 2, Feb. 2009, pp. 44-52.
-
(2009)
Computer
, vol.42
, Issue.2
, pp. 44-52
-
-
Blaze, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Smith, J.M.5
Keromytis, A.D.6
Lee, W.7
-
121
-
-
72249087755
-
Situation-aware trust management
-
New York, USA, Oct.
-
M. Tavakolifard , "Situation-aware Trust Management," Proc. 2009 ACM Conf. on Recommender Systems, New York, USA, Oct. 2009, pp. 413-416.
-
(2009)
Proc. 2009 ACM Conf. on Recommender Systems
, pp. 413-416
-
-
Tavakolifard, M.1
-
122
-
-
84857868505
-
Inferring trust based on similarity with tillit
-
Springer Boston, West Lafayette, USA, June
-
M. Tavakolifard, P. Herrmann, and S. J. Knapskog, "Inferring Trust based on Similarity with TILLIT," Proc. 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), IFIP Advances in Information and Communication Technology: Trust Management III, vol. 300, Springer Boston, West Lafayette, USA, June 2009, pp. 138-148.
-
(2009)
Proc. 3rd IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), IFIP Advances in Information and Communication Technology: Trust Management III
, vol.300
, pp. 138-148
-
-
Tavakolifard, M.1
Herrmann, P.2
Knapskog, S.J.3
-
123
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
New York, NY, 20-23 May
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The Eigentrust Algorithm for Reputation Management in P2P Networks," Proc. 12th Int'l Conf. on World Wide Web, New York, NY, 20-23 May 2003, pp. 640-651.
-
(2003)
Proc. 12th Int'l Conf. on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
124
-
-
35048868826
-
Making eigenvector-based reputation systems robust to collusion
-
Oct.
-
H. Zhang, A. Goel, R. Govindan, K. Mason, and B. Van Roy, "Making Eigenvector-based Reputation Systems Robust to Collusion," Proc. 3rd Int'l Workshop on Algorithms and Models for the Web-Graph, LNCS, vol. 3243, Oct. 2004, pp. 92-104.
-
(2004)
Proc. 3rd Int'l Workshop on Algorithms and Models for the Web-Graph, LNCS
, vol.3243
, pp. 92-104
-
-
Zhang, H.1
Goel, A.2
Govindan, R.3
Mason, K.4
Van Roy, B.5
-
125
-
-
0003839495
-
-
Ph. D. Dissertation, Department of Mathematics and Computer Science: University of Stirling
-
S. Marsh, "Formalizing Trust as a Computational Concept," Ph. D. Dissertation, Department of Mathematics and Computer Science: University of Stirling, 1994.
-
(1994)
Formalizing Trust as a Computational Concept
-
-
Marsh, S.1
|