메뉴 건너뛰기




Volumn 9, Issue 4, 2012, Pages 407-420

Securing recommendations in grouped P2P e-commerce trust model

Author keywords

key generation; key management; Peer to peer (P2P); security; trust

Indexed keywords

KEY GENERATION; KEY MANAGEMENT; PEER TO PEER; SECURITY; TRUST;

EID: 84871002387     PISSN: 19324537     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNSM.2012.091712.120269     Document Type: Article
Times cited : (8)

References (40)
  • 1
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • H. Yu, M. Kaminsky, and A. Flaxman, "SybilGuard: defending against sybil attacks via social networks," in Proc. 2006 SIGCOMM, pp. 267-278.
    • Proc. 2006 SIGCOMM , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Flaxman, A.3
  • 2
    • 33947656426 scopus 로고    scopus 로고
    • Secure and efficient key management in mobile ad hoc networks
    • DOI 10.1016/j.jnca.2005.07.008, PII S1084804505000524
    • B. Wu, J. Wu, E. B. Fernandez, and S. Magliveras, "Secure and efficient key management in mobile ad hoc wireless networks," J. Network and Computer Applications, vol. 30, no. 3, pp. 937-954, Aug. 2007. (Pubitemid 46497022)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.3 , pp. 937-954
    • Wu, B.1    Wu, J.2    Fernandez, E.B.3    Ilyas, M.4    Magliveras, S.5
  • 3
    • 79957478695 scopus 로고    scopus 로고
    • Securing peer-to-peer mobile communications using public key cryptography: New security strategy
    • Feb.
    • S. H. Al-Bakri, M. L. M. Kiah, A. A. Zaidan, B. B. Zaidan, and G. M. Alam, "Securing peer-to-peer mobile communications using public key cryptography: new security strategy," Int'l J. Physical Sciences, vol. 6, no. 4, pp. 930-938, Feb. 2011.
    • (2011) Int'l J. Physical Sciences , vol.6 , Issue.4 , pp. 930-938
    • Al-Bakri, S.H.1    Kiah, M.L.M.2    Zaidan, A.A.3    Zaidan, B.B.4    Alam, G.M.5
  • 4
    • 79960886232 scopus 로고    scopus 로고
    • Secure group key management using uni-directional proxy re-encryption schemes
    • Y. R. Chen, J. D. Tygar, and W. G. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes," in Proc. 2011 IEEE INFOCOM, pp. 1952-1960.
    • Proc. 2011 IEEE INFOCOM , pp. 1952-1960
    • Chen, Y.R.1    Tygar, J.D.2    Tzeng, W.G.3
  • 5
    • 84870982127 scopus 로고    scopus 로고
    • Security of ad hoc networks and threshold cryptography
    • L. Ertaul and N. Chavan, "Security of ad hoc networks and threshold cryptography," IEEE 2005, pp. 1-6.
    • IEEE 2005 , pp. 1-6
    • Ertaul, L.1    Chavan, N.2
  • 6
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized publickey management for mobile ad hoc networks
    • Mar.
    • S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-organized publickey management for mobile ad hoc networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Mar. 2003.
    • (2003) IEEE Trans. Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 8
    • 78649614864 scopus 로고    scopus 로고
    • A group trust model based on service similarity evaluation in P2P networks
    • Y. Zhang, H. Zheng, Y. Liu, K. Li, and W. Qu, "A group trust model based on service similarity evaluation in P2P networks," Int'l J. Intell. Syst., vol. 26, no. 2, pp. 47-62, 2011.
    • (2011) Int'l J. Intell. Syst. , vol.26 , Issue.2 , pp. 47-62
    • Zhang, Y.1    Zheng, H.2    Liu, Y.3    Li, K.4    Qu, W.5
  • 9
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • DOI 10.1109/65.806983
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, pp. 24-30, Dec. 1999. (Pubitemid 30526484)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 12
    • 84886728065 scopus 로고    scopus 로고
    • A scalable encryption scheme for multi-privileged group communications
    • published online Sep., DOI: 10.1007/s11227-011-0683-4
    • G. Wang, Q. Du, W. Zhou, and Q. Liu, "A scalable encryption scheme for multi-privileged group communications," J. Supercomputing, published online Sep. 2011, DOI: 10.1007/s11227-011-0683-4.
    • (2011) J. Supercomputing
    • Wang, G.1    Du, Q.2    Zhou, W.3    Liu, Q.4
  • 14
    • 8344221947 scopus 로고    scopus 로고
    • Scalable hierarchical access control in secure group communications
    • Y. Sun and K. J. R. Liu, "Scalable hierarchical access control in secure group communications," in Proc. 2004 IEEE INFOCOM, pp. 1296-1306.
    • Proc. 2004 IEEE INFOCOM , pp. 1296-1306
    • Sun, Y.1    Liu, K.J.R.2
  • 15
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. 2002 ACM CCS,, pp. 41-47.
    • Proc. 2002 ACM CCS , pp. 41-47
    • Eschenauer, L.1    Gligor, V.2
  • 16
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation based trust for peer-to-peer electronic communities
    • July
    • L. Xiong and L. Liu, "PeerTrust: supporting reputation based trust for peer-to-peer electronic communities," IEEE Trans. Knowledge and Data Engineer., vol. 16, no. 7, pp. 843-857, July 2004.
    • (2004) IEEE Trans. Knowledge and Data Engineer , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 17
    • 33846834126 scopus 로고    scopus 로고
    • A survery of trust and reputation systems for online service provision
    • A. Josang, R. Ismail, and C. Boyd, "A survery of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2077.
    • (2077) Decision Support Systems , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 18
    • 79957616752 scopus 로고    scopus 로고
    • Novel key pre-distribution scheme in wireless sensor network
    • T. D. Subash and C. Divya, "Novel key pre-distribution scheme in wireless sensor network," in Proc. 2011 ICETECT, pp. 959-970.
    • Proc. 2011 ICETECT , pp. 959-970
    • Subash, T.D.1    Divya, C.2
  • 20
    • 84871004637 scopus 로고    scopus 로고
    • Framework of decentralized PKI key management based on dynamic trust
    • Z. Xu and H. Jiang, "Framework of decentralized PKI key management based on dynamic trust," in Proc. 2008 IPCV, pp. 1-7.
    • Proc. 2008 IPCV , pp. 1-7
    • Xu, Z.1    Jiang, H.2
  • 24
    • 77953887822 scopus 로고    scopus 로고
    • Constructing efficient attribute-based broadcast encryption
    • Z. Zhou and D. Huang, "Constructing efficient attribute-based broadcast encryption," in Proc. 2010 IEEE INFOCOM, pp. 1-2.
    • Proc. 2010 IEEE INFOCOM , pp. 1-2
    • Zhou, Z.1    Huang, D.2
  • 25
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 31
    • 84871008163 scopus 로고    scopus 로고
    • Study of security issues on traditional and new generation of e-commerce model
    • S. M. R. Farshchi, F. Gharib, R. Ziyaeef, "Study of security issues on traditional and new generation of e-commerce model," in Proc. 2011 IPCSIT (9), pp. 113-117.
    • Proc. 2011 IPCSIT , Issue.9 , pp. 113-117
    • Farshchi, S.M.R.1    Gharib, F.2    Ziyaeef, R.3
  • 32
    • 33750959755 scopus 로고    scopus 로고
    • Efficient node admission for shortlived mobile ad hoc networks
    • N. Saxena, G. Tsudik, and J. H. Yi, "Efficient node admission for shortlived mobile ad hoc networks," in Proc. 2005 Networking Protocols, pp. 268-278.
    • Proc. 2005 Networking Protocols , pp. 268-278
    • Saxena, N.1    Tsudik, G.2    Yi, J.H.3
  • 33
    • 51249094081 scopus 로고    scopus 로고
    • A key management protocol for wireless sensor networks with multiple base stations
    • Y. Wang, B. Ramamurthy, and Y. Xue, "A key management protocol for wireless sensor networks with multiple base stations," in Proc. 2008 IEEE ICC, pp. 1625-1629.
    • Proc. 2008 IEEE ICC , pp. 1625-1629
    • Wang, Y.1    Ramamurthy, B.2    Xue, Y.3
  • 34
    • 0033356116 scopus 로고    scopus 로고
    • Survey of security issues in multicast communications
    • DOI 10.1109/65.806981
    • M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol. 13, no. 6, pp. 12-23, Dec 1999. (Pubitemid 30526485)
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 12-23
    • Moyer, M.J.1    Rao, J.R.2    Rohatgi, P.3
  • 36
    • 3543050471 scopus 로고    scopus 로고
    • Efficient self-healing group key distribution with revocation capability
    • D. Liu, P. Ning, and K. Sun, "Efficient self-healing group key distribution with revocation capability," in Proc. 2003 CCS, pp. 231-240.
    • Proc. 2003 CCS , pp. 231-240
    • Liu, D.1    Ning, P.2    Sun, K.3
  • 38
    • 79960859750 scopus 로고    scopus 로고
    • Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
    • S. Ruj, A. Nayak, and I. Stojmenovic, "Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs," in Proc. 2011 IEEE INFOCOM, pp. 326-330.
    • Proc. 2011 IEEE INFOCOM , pp. 326-330
    • Ruj, S.1    Nayak, A.2    Stojmenovic, I.3
  • 40
    • 84870998698 scopus 로고    scopus 로고
    • Public key infrastructure based on a peer-to-peer network
    • W. Thomas, "Public key infrastructure based on a peer-to-peer network," in Proc. 2005 IEEE System Sciences, pp. 1-10.
    • Proc. 2005 IEEE System Sciences , pp. 1-10
    • Thomas, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.