메뉴 건너뛰기




Volumn 6, Issue 6, 2013, Pages 669-688

Comparative study of trust and reputation systems for wireless sensor networks

Author keywords

Repute; Trust; Trust and reputation systems; WSN

Indexed keywords

NETWORK SECURITY; SURVEYS;

EID: 84876783129     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.597     Document Type: Review
Times cited : (91)

References (95)
  • 4
    • 34547281955 scopus 로고    scopus 로고
    • Approximate optimal sensor placements in grid sensor fields. 65th Semi-annual IEEE Vehicular Technology Conference (VTC), Dublin, Ireland, April
    • Khan SU. Approximate optimal sensor placements in grid sensor fields. 65th Semi-annual IEEE Vehicular Technology Conference (VTC), Dublin, Ireland, April 2007; 248-251.
    • (2007) , pp. 248-251
    • Khan, S.U.1
  • 9
    • 84872090386 scopus 로고    scopus 로고
    • Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
    • Bistarelli S, Foley SN, O'Sullivan B, Santini F. Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. Security and Communication Networks 2010; 3(6):595-610.
    • (2010) Security and Communication Networks , vol.3 , Issue.6 , pp. 595-610
    • Bistarelli, S.1    Foley, S.N.2    O'Sullivan, B.3    Santini, F.4
  • 14
    • 84862103909 scopus 로고    scopus 로고
    • Collaborative service evaluation with the TwoHop trust framework
    • DOI: 10.1002/sec.355, Article first published online: 29 July
    • Glynos D, Argyroudis P, Douligeris C. Collaborative service evaluation with the TwoHop trust framework. Security and Communication Networks. DOI: 10.1002/sec.355, Article first published online: 29 July, 2011.
    • (2011) Security and Communication Networks
    • Glynos, D.1    Argyroudis, P.2    Douligeris, C.3
  • 16
    • 79951784320 scopus 로고    scopus 로고
    • FineTrust: a fine-grained trust model for peer-to-peer networks
    • Ren Y, Li M, Sakurai K. FineTrust: a fine-grained trust model for peer-to-peer networks. Security and Communication Networks 2011; 4(1):61-69.
    • (2011) Security and Communication Networks , vol.4 , Issue.1 , pp. 61-69
    • Ren, Y.1    Li, M.2    Sakurai, K.3
  • 18
    • 84860742864 scopus 로고    scopus 로고
    • Trust computations and trust dynamics in mobile adhoc networks: a survey
    • Govindan K, Mohapatra P. Trust computations and trust dynamics in mobile adhoc networks: a survey. IEEE Communications Surveys and Tutorials 2011; 99:1-20.
    • (2011) IEEE Communications Surveys and Tutorials , vol.99 , pp. 1-20
    • Govindan, K.1    Mohapatra, P.2
  • 19
    • 80052406591 scopus 로고    scopus 로고
    • Survey of security issues in cognitive radio networks
    • El-Hajj W, Safa H, Guizani M. Survey of security issues in cognitive radio networks. Journal of Internet Technology 2011; 12(2):181-198.
    • (2011) Journal of Internet Technology , vol.12 , Issue.2 , pp. 181-198
    • El-Hajj, W.1    Safa, H.2    Guizani, M.3
  • 20
    • 77950866308 scopus 로고    scopus 로고
    • Trust management systems for wireless sensor networks: best practices
    • Lopez J, Roman R, Agudo I, Fernandez-Gago C. Trust management systems for wireless sensor networks: best practices. Computer Communications 2010; 33(9):1086-1093.
    • (2010) Computer Communications , vol.33 , Issue.9 , pp. 1086-1093
    • Lopez, J.1    Roman, R.2    Agudo, I.3    Fernandez-Gago, C.4
  • 21
    • 77956948315 scopus 로고    scopus 로고
    • A Survey of trust and reputation management systems in wireless communications
    • Esch J. A Survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 2010; 98(10):1755-1772.
    • (2010) Proceedings of the IEEE , vol.98 , Issue.10 , pp. 1755-1772
    • Esch, J.1
  • 25
    • 67649333766 scopus 로고    scopus 로고
    • A survey on secure localization in wireless sensor networks
    • Furht B (ed). CRC Press, Taylor and Francis Group: Florida, USA
    • Srinivasan A, Wu J. A survey on secure localization in wireless sensor networks. In Encyclopedia of Wireless and Mobile Communications, Furht B (ed). CRC Press, Taylor and Francis Group: Florida, USA, 2007.
    • (2007) Encyclopedia of Wireless and Mobile Communications
    • Srinivasan, A.1    Wu, J.2
  • 28
    • 0017930809 scopus 로고
    • a method for obtaining digital signatures and public-key cryptosystems
    • Rivest R, Shamir A, Adleman L. a method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 30
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M. A survey of key management schemes in wireless sensor networks. Computer Communications 2007; 30(11-12):2314-2341.
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 31
    • 79957583041 scopus 로고    scopus 로고
    • Multimedia traffic security architecture for internet of things
    • Zhou L, Chao H. Multimedia traffic security architecture for internet of things. IEEE Network 2011; 25(3):29-34.
    • (2011) IEEE Network , vol.25 , Issue.3 , pp. 29-34
    • Zhou, L.1    Chao, H.2
  • 32
    • 34548043694 scopus 로고    scopus 로고
    • Trust-based security for wireless ad-hoc and sensor networks
    • Boukerch A, Xu L, El-Khatib K. Trust-based security for wireless ad-hoc and sensor networks. Computer Communications- Elsevier 2007; 30(11-12):2413-2427.
    • (2007) Computer Communications- Elsevier , vol.30 , Issue.11-12 , pp. 2413-2427
    • Boukerch, A.1    Xu, L.2    El-Khatib, K.3
  • 33
  • 35
    • 84876794616 scopus 로고    scopus 로고
    • A robust reputation system for peer-to-peer and mobile ad-hoc networks. Proceedings of P2PEcon, June .
    • Buchegger S, Boudec JYL. A robust reputation system for peer-to-peer and mobile ad-hoc networks. Proceedings of P2PEcon, June 2004.
    • (2004)
    • Buchegger, S.1    Boudec, J.Y.L.2
  • 37
    • 33750328371 scopus 로고    scopus 로고
    • Developing a model for trust management in pervasive devices. 4th Annual IEEE International Conference on Pervasive Computation Communication, Washington DC
    • Almenarez F, Marin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices. 4th Annual IEEE International Conference on Pervasive Computation Communication, Washington DC, 2006; 267-271.
    • (2006) , pp. 267-271
    • Almenarez, F.1    Marin, A.2    Diaz, D.3    Sanchez, J.4
  • 39
    • 84876807586 scopus 로고    scopus 로고
    • Advances in wireless, mobile and P2P based internet protocols, applications, and architectures
    • Khan SU, Loukopoulos T, Li H. Advances in wireless, mobile and P2P based internet protocols, applications, and architectures. International Journal of Internet Protocol Technology 2011; 6(1-2):1-2.
    • (2011) International Journal of Internet Protocol Technology , vol.6 , Issue.1-2 , pp. 1-2
    • Khan, S.U.1    Loukopoulos, T.2    Li, H.3
  • 40
    • 0035747559 scopus 로고    scopus 로고
    • Proceedings of the 10th international conference on Information and knowledge management ACM, New York
    • Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. Proceedings of the 10th international conference on Information and knowledge management ACM, New York, 2001.
    • (2001) Managing trust in a peer-2-peer information system
    • Aberer, K.1    Despotovic, Z.2
  • 43
    • 76649094265 scopus 로고    scopus 로고
    • Opportunities in opportunistic computing
    • Conti M, Kumar M. Opportunities in opportunistic computing. IEEE Computer 2010; 43(1):42-50.
    • (2010) IEEE Computer , vol.43 , Issue.1 , pp. 42-50
    • Conti, M.1    Kumar, M.2
  • 44
    • 80052847304 scopus 로고    scopus 로고
    • Trustworthy broadcasting in IEEE 802.11p/WAVE vehicular networks: delay analysis
    • Vinel A, Campolo C, Petit J, Koucheryavy Y. Trustworthy broadcasting in IEEE 802.11p/WAVE vehicular networks: delay analysis. IEEE Communications Letters 2011; 15(9):1010-1012.
    • (2011) IEEE Communications Letters , vol.15 , Issue.9 , pp. 1010-1012
    • Vinel, A.1    Campolo, C.2    Petit, J.3    Koucheryavy, Y.4
  • 46
    • 84861815985 scopus 로고    scopus 로고
    • A semantics-based approach to large-scale mobile social networking
    • Li J, Wang H, Khan SU. A semantics-based approach to large-scale mobile social networking. ACM/Springer Mobile Networks and Applications 2012; 17(2):192-205.
    • (2012) ACM/Springer Mobile Networks and Applications , vol.17 , Issue.2 , pp. 192-205
    • Li, J.1    Wang, H.2    Khan, S.U.3
  • 50
    • 84876816571 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol (cooperation of nodes-fairness in dynamic ad-hoc networks). 3rd ACM International Symposium on MobiHoc, Lausanne, June
    • Buchegger S, Boudec L. Performance analysis of the CONFIDANT protocol (cooperation of nodes-fairness in dynamic ad-hoc networks). 3rd ACM International Symposium on MobiHoc, Lausanne, June 2002.
    • (2002)
    • Buchegger, S.1    Boudec, L.2
  • 51
    • 84876810934 scopus 로고    scopus 로고
    • CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communication and Multimedia Security, September
    • Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communication and Multimedia Security, September, 2002.
    • (2002)
    • Michiardi, P.1    Molva, R.2
  • 54
    • 0001341422 scopus 로고    scopus 로고
    • DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks
    • Chapter 5, Perkins CE (ed). Addison-Wesley: Boston, Massachusetts, USA
    • Johnson DB, Maltz DA. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking, Chapter 5, Perkins CE (ed). Addison-Wesley: Boston, Massachusetts, USA, 2001; 139-172.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2
  • 55
    • 84876812589 scopus 로고    scopus 로고
    • An agent-based trust and reputation management scheme. IEEE Global Telecommunications Conference
    • Boukerche A, Li X. An agent-based trust and reputation management scheme. IEEE Global Telecommunications Conference, 2005; pp. 5.
    • (2005) , pp. 5
    • Boukerche, A.1    Li, X.2
  • 56
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: greedy perimeter stateless routing for wireless networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00)
    • Karp B, Kung HT. GPSR: greedy perimeter stateless routing for wireless networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00), 2000.
    • (2000)
    • Karp, B.1    Kung, H.T.2
  • 57
    • 36949013183 scopus 로고    scopus 로고
    • DRBTS: distributed reputation based beacon trust system. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06)
    • Srinivasan A, Wu J, Teitelbaum J. DRBTS: distributed reputation based beacon trust system. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), 2006; 277-283.
    • (2006) , pp. 277-283
    • Srinivasan, A.1    Wu, J.2    Teitelbaum, J.3
  • 60
    • 84876800560 scopus 로고    scopus 로고
    • TinySec: link layer encryption for tiny devices. Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys)
    • Karlof C, Sastry N, Wagner D. TinySec: link layer encryption for tiny devices. Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), 2004.
    • (2004)
    • Karlof, C.1    Sastry, N.2    Wagner, D.3
  • 61
    • 84876804169 scopus 로고    scopus 로고
    • Location and identity based secure event report generation for sensor networks. Nested Data-Parallel Language (NESL) Technical Report, May .
    • Ganeriwal S, Kumar R, Han C, Lee S, Srivastava MB. Location and identity based secure event report generation for sensor networks. Nested Data-Parallel Language (NESL) Technical Report, May 2004.
    • (2004)
    • Ganeriwal, S.1    Kumar, R.2    Han, C.3    Lee, S.4    Srivastava, M.B.5
  • 62
    • 14844304757 scopus 로고    scopus 로고
    • TinyPK: securing sensor networks with public key technology. Second workshop on Security in Sensor and Ad-hoc Networks
    • Watro R, Kong D, Cuti SF, Gardiner C, Lynn C, Kruus P. TinyPK: securing sensor networks with public key technology. Second workshop on Security in Sensor and Ad-hoc Networks, 2004.
    • (2004)
    • Watro, R.1    Kong, D.2    Cuti, S.F.3    Gardiner, C.4    Lynn, C.5    Kruus, P.6
  • 63
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE Infocom
    • Ye F, Luo H, Lu S, Zhang L. Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE Infocom, 2004.
    • (2004)
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 64
    • 30344482882 scopus 로고    scopus 로고
    • INSENS: intrusion-tolerant routing for wireless sensor networks
    • Deng J, Han R, Mishra S. INSENS: intrusion-tolerant routing for wireless sensor networks. Journal of Computer Communications 2006; 29(2):216-230.
    • (2006) Journal of Computer Communications , vol.29 , Issue.2 , pp. 216-230
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 65
    • 79953171081 scopus 로고    scopus 로고
    • Intertemporal discount factors as a measure of trustworthiness in electronic commerce
    • Hazard CJ, Singh MP. Intertemporal discount factors as a measure of trustworthiness in electronic commerce. IEEE Transactions on Knowledge and Data Engineering 2011; 23(5):699-721.
    • (2011) IEEE Transactions on Knowledge and Data Engineering , vol.23 , Issue.5 , pp. 699-721
    • Hazard, C.J.1    Singh, M.P.2
  • 66
    • 77954862343 scopus 로고    scopus 로고
    • Clarifying the integration of trust and TAM in e-commerce environments: implications for systems design and management
    • Benamati J, Fuller MA, Serva MA, Baroudi J. Clarifying the integration of trust and TAM in e-commerce environments: implications for systems design and management. IEEE Transactions on Engineering Management 2010; 57(3):380-393.
    • (2010) IEEE Transactions on Engineering Management , vol.57 , Issue.3 , pp. 380-393
    • Benamati, J.1    Fuller, M.A.2    Serva, M.A.3    Baroudi, J.4
  • 68
    • 47649116292 scopus 로고    scopus 로고
    • Reputation-oriented trustworthy computing in e-commerce environments
    • Wang Y, Lin K. Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Computing 2008; 12(4):55-59.
    • (2008) IEEE Internet Computing , vol.12 , Issue.4 , pp. 55-59
    • Wang, Y.1    Lin, K.2
  • 69
    • 84876806804 scopus 로고    scopus 로고
    • The beta reputation system. The 15th Bled Electronic Commerce Conference, Slovenia
    • Josang A, Ismail R. The beta reputation system. The 15th Bled Electronic Commerce Conference, Slovenia, 2002.
    • (2002)
    • Josang, A.1    Ismail, R.2
  • 71
    • 84876811347 scopus 로고    scopus 로고
    • The keynote trust management system. University of Pennsylvania
    • Blaze M, Feigenbaum J, Ioannidis J, Keromytis A. The keynote trust management system. University of Pennsylvania, 1999.
    • (1999)
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 73
    • 78149431890 scopus 로고    scopus 로고
    • Situation-aware trust architecture for vehicular networks
    • Dijiang H, Xiaoyan H, Gerla M. Situation-aware trust architecture for vehicular networks. IEEE Communications Magazine 2010; 48(11):128-135.
    • (2010) IEEE Communications Magazine , vol.48 , Issue.11 , pp. 128-135
    • Dijiang, H.1    Xiaoyan, H.2    Gerla, M.3
  • 74
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: a privacy-preserving online social network leveraging on real-life trust
    • Cutillo LA, Molva R, Strufe T. Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 2009; 47(12):94-101.
    • (2009) IEEE Communications Magazine , vol.47 , Issue.12 , pp. 94-101
    • Cutillo, L.A.1    Molva, R.2    Strufe, T.3
  • 75
    • 63349097435 scopus 로고    scopus 로고
    • Social search: exploring and searching social architectures in digital networks
    • Trier M, Bobrik A. Social search: exploring and searching social architectures in digital networks. IEEE Internet Computing 2009; 13(2):51-59.
    • (2009) IEEE Internet Computing , vol.13 , Issue.2 , pp. 51-59
    • Trier, M.1    Bobrik, A.2
  • 77
    • 0033903726 scopus 로고    scopus 로고
    • Supporting trust in virtual communities. 33rd Hawaii International Conference on System Sciences, Hawaii
    • Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. 33rd Hawaii International Conference on System Sciences, Hawaii, 2000.
    • (2000)
    • Abdul-Rahman, A.1    Hailes, S.2
  • 78
    • 80053280690 scopus 로고    scopus 로고
    • Parameter-estimation based trust model for unstructured peer-to-peer networks
    • Chen S, Zhang Y, Yang G. Parameter-estimation based trust model for unstructured peer-to-peer networks. IET Communications 2011; 5(7):922-928.
    • (2011) IET Communications , vol.5 , Issue.7 , pp. 922-928
    • Chen, S.1    Zhang, Y.2    Yang, G.3
  • 81
    • 34047150751 scopus 로고    scopus 로고
    • PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing
    • Zhou R, Hwang K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems 2007; 18(5):1-14.
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.5 , pp. 1-14
    • Zhou, R.1    Hwang, K.2
  • 83
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities
    • Xiong L, Liu L. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 2004; 16(7):843-857.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 85
    • 63049083674 scopus 로고    scopus 로고
    • QGrid: an adaptive trust aware resource management framework
    • Lin L, Huai J. QGrid: an adaptive trust aware resource management framework. IEEE Systems Journal 2009; 3(1):78-90.
    • (2009) IEEE Systems Journal , vol.3 , Issue.1 , pp. 78-90
    • Lin, L.1    Huai, J.2
  • 87
    • 33646486528 scopus 로고    scopus 로고
    • Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling
    • Song S, Hwang K, Kwok Y. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Transactions on Computers 2006; 55(6):703-719.
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.6 , pp. 703-719
    • Song, S.1    Hwang, K.2    Kwok, Y.3
  • 88
    • 28844464697 scopus 로고    scopus 로고
    • Trusted grid computing with security binding and trust integration
    • Song S, Hwang K, Kwok Y. Trusted grid computing with security binding and trust integration. Journal of Grid Computing 2005; 3(1-2):53-73.
    • (2005) Journal of Grid Computing , vol.3 , Issue.1-2 , pp. 53-73
    • Song, S.1    Hwang, K.2    Kwok, Y.3
  • 89
    • 79955684217 scopus 로고    scopus 로고
    • Dynamic trust model for reliable transactions in multi-agent systems. 13th International Conference on Advanced Communication Technology (ICACT)
    • Das A, Islam MM, Sorwar G. Dynamic trust model for reliable transactions in multi-agent systems. 13th International Conference on Advanced Communication Technology (ICACT), 2011; 1101-1106.
    • (2011) , pp. 1101-1106
    • Das, A.1    Islam, M.M.2    Sorwar, G.3
  • 90
    • 77957665224 scopus 로고    scopus 로고
    • Trust opportunistic routing protocol in multi-hop wireless networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)
    • Wang B, Huang C, Yang W, Wang T. Trust opportunistic routing protocol in multi-hop wireless networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010; 563-567.
    • (2010) , pp. 563-567
    • Wang, B.1    Huang, C.2    Yang, W.3    Wang, T.4
  • 91
    • 77954254371 scopus 로고    scopus 로고
    • Trust management in opportunistic networks. 9th International Conference on Networks (ICN)
    • Goncalves MRP, Moreira EDS, Martimiano LAF. Trust management in opportunistic networks. 9th International Conference on Networks (ICN), 2010; 209-214.
    • (2010) , pp. 209-214
    • Goncalves, M.R.P.1    Moreira, E.D.S.2    Martimiano, L.A.F.3
  • 92
    • 77951433690 scopus 로고    scopus 로고
    • Trust management in opportunistic pervasive healthcare systems. 16th IEEE International Conference on Electronics, Circuits and Systems (ICECS)
    • Denko MK, Woungang I, Obaidat MS. Trust management in opportunistic pervasive healthcare systems. 16th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2009; 832-835.
    • (2009) , pp. 832-835
    • Denko, M.K.1    Woungang, I.2    Obaidat, M.S.3
  • 93
    • 35148895900 scopus 로고    scopus 로고
    • 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
    • Chen H, Zhou X, Gao C. Agent-based trust model in wireless sensor networks. 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007; 119-124.
    • (2007) Agent-based trust model in wireless sensor networks , pp. 119-124
    • Chen, H.1    Zhou, X.2    Gao, C.3
  • 95
    • 84911875895 scopus 로고    scopus 로고
    • A survey of key distribution in wireless sensor networks
    • DOI: 10.1002/sec.354, article first published online, July
    • Chen C-Y, Chao H-C. A survey of key distribution in wireless sensor networks. Security and Communication Networks. DOI: 10.1002/sec.354, article first published online, July 2011.
    • (2011) Security and Communication Networks
    • Chen, C.-Y.1    Chao, H.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.