-
1
-
-
84859157992
-
Clustering-based power controlled routing for mobile wireless sensor networks
-
Khan AR, Madani SA, Hayat K, Khan SU. Clustering-based power controlled routing for mobile wireless sensor networks. International Journal of Communication Systems 2012; 25(4):529-542.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.4
, pp. 529-542
-
-
Khan, A.R.1
Madani, S.A.2
Hayat, K.3
Khan, S.U.4
-
2
-
-
46449122114
-
Wireless sensor network survey
-
Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey. Computer Networks: The International Journal of Computer and Telecommunications Networking, Elsevier 2008; 52(12):2292-2330.
-
(2008)
Computer Networks: The International Journal of Computer and Telecommunications Networking, Elsevier
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
3
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks. IEEE Communications Magazine 2002; 40(8):104-112.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 104-112
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
4
-
-
34547281955
-
-
Approximate optimal sensor placements in grid sensor fields. 65th Semi-annual IEEE Vehicular Technology Conference (VTC), Dublin, Ireland, April
-
Khan SU. Approximate optimal sensor placements in grid sensor fields. 65th Semi-annual IEEE Vehicular Technology Conference (VTC), Dublin, Ireland, April 2007; 248-251.
-
(2007)
, pp. 248-251
-
-
Khan, S.U.1
-
7
-
-
74049112130
-
Distributed event-triggered trust management for wireless sensor networks
-
Liu S, Pang L, Pei Q, Ma H, Peng Q. Distributed event-triggered trust management for wireless sensor networks. Fifth International Conference on Information Assurance and Security, 2009.
-
(2009)
Fifth International Conference on Information Assurance and Security
-
-
Liu, S.1
Pang, L.2
Pei, Q.3
Ma, H.4
Peng, Q.5
-
9
-
-
84872090386
-
Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria
-
Bistarelli S, Foley SN, O'Sullivan B, Santini F. Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. Security and Communication Networks 2010; 3(6):595-610.
-
(2010)
Security and Communication Networks
, vol.3
, Issue.6
, pp. 595-610
-
-
Bistarelli, S.1
Foley, S.N.2
O'Sullivan, B.3
Santini, F.4
-
14
-
-
84862103909
-
Collaborative service evaluation with the TwoHop trust framework
-
DOI: 10.1002/sec.355, Article first published online: 29 July
-
Glynos D, Argyroudis P, Douligeris C. Collaborative service evaluation with the TwoHop trust framework. Security and Communication Networks. DOI: 10.1002/sec.355, Article first published online: 29 July, 2011.
-
(2011)
Security and Communication Networks
-
-
Glynos, D.1
Argyroudis, P.2
Douligeris, C.3
-
16
-
-
79951784320
-
FineTrust: a fine-grained trust model for peer-to-peer networks
-
Ren Y, Li M, Sakurai K. FineTrust: a fine-grained trust model for peer-to-peer networks. Security and Communication Networks 2011; 4(1):61-69.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.1
, pp. 61-69
-
-
Ren, Y.1
Li, M.2
Sakurai, K.3
-
20
-
-
77950866308
-
Trust management systems for wireless sensor networks: best practices
-
Lopez J, Roman R, Agudo I, Fernandez-Gago C. Trust management systems for wireless sensor networks: best practices. Computer Communications 2010; 33(9):1086-1093.
-
(2010)
Computer Communications
, vol.33
, Issue.9
, pp. 1086-1093
-
-
Lopez, J.1
Roman, R.2
Agudo, I.3
Fernandez-Gago, C.4
-
21
-
-
77956948315
-
A Survey of trust and reputation management systems in wireless communications
-
Esch J. A Survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 2010; 98(10):1755-1772.
-
(2010)
Proceedings of the IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Esch, J.1
-
24
-
-
77956948315
-
A survey of trust and reputation management systems in wireless communications
-
Yu H, Shen Z. A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, School of Computer Engineering, Nanyang Technology University, Singapore 2010; 98(10):1755-1772.
-
(2010)
Proceedings of the IEEE, School of Computer Engineering, Nanyang Technology University, Singapore
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Yu, H.1
Shen, Z.2
-
25
-
-
67649333766
-
A survey on secure localization in wireless sensor networks
-
Furht B (ed). CRC Press, Taylor and Francis Group: Florida, USA
-
Srinivasan A, Wu J. A survey on secure localization in wireless sensor networks. In Encyclopedia of Wireless and Mobile Communications, Furht B (ed). CRC Press, Taylor and Francis Group: Florida, USA, 2007.
-
(2007)
Encyclopedia of Wireless and Mobile Communications
-
-
Srinivasan, A.1
Wu, J.2
-
28
-
-
0017930809
-
a method for obtaining digital signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L. a method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
30
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
Xiao Y, Rayi VK, Sun B, Du X, Hu F, Galloway M. A survey of key management schemes in wireless sensor networks. Computer Communications 2007; 30(11-12):2314-2341.
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
31
-
-
79957583041
-
Multimedia traffic security architecture for internet of things
-
Zhou L, Chao H. Multimedia traffic security architecture for internet of things. IEEE Network 2011; 25(3):29-34.
-
(2011)
IEEE Network
, vol.25
, Issue.3
, pp. 29-34
-
-
Zhou, L.1
Chao, H.2
-
32
-
-
34548043694
-
Trust-based security for wireless ad-hoc and sensor networks
-
Boukerch A, Xu L, El-Khatib K. Trust-based security for wireless ad-hoc and sensor networks. Computer Communications- Elsevier 2007; 30(11-12):2413-2427.
-
(2007)
Computer Communications- Elsevier
, vol.30
, Issue.11-12
, pp. 2413-2427
-
-
Boukerch, A.1
Xu, L.2
El-Khatib, K.3
-
34
-
-
84864182941
-
Reputation and trust based system for ad hoc and sensor networks
-
Boukerche A (ed). Wiley & Sons: New Jersey
-
Srinivasan A, Teitelbaum J, Liang H, Wu J, Cardei M. Reputation and trust based system for ad hoc and sensor networks. In Algorithms and Protocols for Wireless Ad-Hoc and Sensor Networks, Boukerche A (ed). Wiley & Sons: New Jersey, 2008.
-
(2008)
Algorithms and Protocols for Wireless Ad-Hoc and Sensor Networks
-
-
Srinivasan, A.1
Teitelbaum, J.2
Liang, H.3
Wu, J.4
Cardei, M.5
-
35
-
-
84876794616
-
-
A robust reputation system for peer-to-peer and mobile ad-hoc networks. Proceedings of P2PEcon, June .
-
Buchegger S, Boudec JYL. A robust reputation system for peer-to-peer and mobile ad-hoc networks. Proceedings of P2PEcon, June 2004.
-
(2004)
-
-
Buchegger, S.1
Boudec, J.Y.L.2
-
37
-
-
33750328371
-
-
Developing a model for trust management in pervasive devices. 4th Annual IEEE International Conference on Pervasive Computation Communication, Washington DC
-
Almenarez F, Marin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices. 4th Annual IEEE International Conference on Pervasive Computation Communication, Washington DC, 2006; 267-271.
-
(2006)
, pp. 267-271
-
-
Almenarez, F.1
Marin, A.2
Diaz, D.3
Sanchez, J.4
-
39
-
-
84876807586
-
Advances in wireless, mobile and P2P based internet protocols, applications, and architectures
-
Khan SU, Loukopoulos T, Li H. Advances in wireless, mobile and P2P based internet protocols, applications, and architectures. International Journal of Internet Protocol Technology 2011; 6(1-2):1-2.
-
(2011)
International Journal of Internet Protocol Technology
, vol.6
, Issue.1-2
, pp. 1-2
-
-
Khan, S.U.1
Loukopoulos, T.2
Li, H.3
-
40
-
-
0035747559
-
-
Proceedings of the 10th international conference on Information and knowledge management ACM, New York
-
Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. Proceedings of the 10th international conference on Information and knowledge management ACM, New York, 2001.
-
(2001)
Managing trust in a peer-2-peer information system
-
-
Aberer, K.1
Despotovic, Z.2
-
43
-
-
76649094265
-
Opportunities in opportunistic computing
-
Conti M, Kumar M. Opportunities in opportunistic computing. IEEE Computer 2010; 43(1):42-50.
-
(2010)
IEEE Computer
, vol.43
, Issue.1
, pp. 42-50
-
-
Conti, M.1
Kumar, M.2
-
44
-
-
80052847304
-
Trustworthy broadcasting in IEEE 802.11p/WAVE vehicular networks: delay analysis
-
Vinel A, Campolo C, Petit J, Koucheryavy Y. Trustworthy broadcasting in IEEE 802.11p/WAVE vehicular networks: delay analysis. IEEE Communications Letters 2011; 15(9):1010-1012.
-
(2011)
IEEE Communications Letters
, vol.15
, Issue.9
, pp. 1010-1012
-
-
Vinel, A.1
Campolo, C.2
Petit, J.3
Koucheryavy, Y.4
-
45
-
-
0002101577
-
Reputation systems: facilitating trust in e-commerce systems
-
Resnick P, Kuwabara K, Zeckhauser R, Friedman E. Reputation systems: facilitating trust in e-commerce systems. Communications of the ACM 2006; 43(12):45-48.
-
(2006)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
49
-
-
24744469215
-
A framework for key management in a mobile ad hoc network
-
China, 4-6 April
-
Hadjichristofi GC, Adams WJ, Davis NJ. A framework for key management in a mobile ad hoc network. Proceedings of International Conference on Information Technology: Coding and Computing, China, Vol. 2, 4-6 April 2005; 568-573.
-
(2005)
Proceedings of International Conference on Information Technology: Coding and Computing
, vol.2
, pp. 568-573
-
-
Hadjichristofi, G.C.1
Adams, W.J.2
Davis, N.J.3
-
50
-
-
84876816571
-
-
Performance analysis of the CONFIDANT protocol (cooperation of nodes-fairness in dynamic ad-hoc networks). 3rd ACM International Symposium on MobiHoc, Lausanne, June
-
Buchegger S, Boudec L. Performance analysis of the CONFIDANT protocol (cooperation of nodes-fairness in dynamic ad-hoc networks). 3rd ACM International Symposium on MobiHoc, Lausanne, June 2002.
-
(2002)
-
-
Buchegger, S.1
Boudec, L.2
-
51
-
-
84876810934
-
-
CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communication and Multimedia Security, September
-
Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communication and Multimedia Security, September, 2002.
-
(2002)
-
-
Michiardi, P.1
Molva, R.2
-
54
-
-
0001341422
-
DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks
-
Chapter 5, Perkins CE (ed). Addison-Wesley: Boston, Massachusetts, USA
-
Johnson DB, Maltz DA. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking, Chapter 5, Perkins CE (ed). Addison-Wesley: Boston, Massachusetts, USA, 2001; 139-172.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
-
55
-
-
84876812589
-
-
An agent-based trust and reputation management scheme. IEEE Global Telecommunications Conference
-
Boukerche A, Li X. An agent-based trust and reputation management scheme. IEEE Global Telecommunications Conference, 2005; pp. 5.
-
(2005)
, pp. 5
-
-
Boukerche, A.1
Li, X.2
-
56
-
-
0034547115
-
-
GPSR: greedy perimeter stateless routing for wireless networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00)
-
Karp B, Kung HT. GPSR: greedy perimeter stateless routing for wireless networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom'00), 2000.
-
(2000)
-
-
Karp, B.1
Kung, H.T.2
-
57
-
-
36949013183
-
-
DRBTS: distributed reputation based beacon trust system. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06)
-
Srinivasan A, Wu J, Teitelbaum J. DRBTS: distributed reputation based beacon trust system. 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), 2006; 277-283.
-
(2006)
, pp. 277-283
-
-
Srinivasan, A.1
Wu, J.2
Teitelbaum, J.3
-
59
-
-
0036738266
-
SPINS: security protocols for sensor networks
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar D. SPINS: security protocols for sensor networks. Wireless Networks Journal 2002; 8(5):189-199.
-
(2002)
Wireless Networks Journal
, vol.8
, Issue.5
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, D.5
-
60
-
-
84876800560
-
-
TinySec: link layer encryption for tiny devices. Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys)
-
Karlof C, Sastry N, Wagner D. TinySec: link layer encryption for tiny devices. Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys), 2004.
-
(2004)
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
61
-
-
84876804169
-
-
Location and identity based secure event report generation for sensor networks. Nested Data-Parallel Language (NESL) Technical Report, May .
-
Ganeriwal S, Kumar R, Han C, Lee S, Srivastava MB. Location and identity based secure event report generation for sensor networks. Nested Data-Parallel Language (NESL) Technical Report, May 2004.
-
(2004)
-
-
Ganeriwal, S.1
Kumar, R.2
Han, C.3
Lee, S.4
Srivastava, M.B.5
-
62
-
-
14844304757
-
-
TinyPK: securing sensor networks with public key technology. Second workshop on Security in Sensor and Ad-hoc Networks
-
Watro R, Kong D, Cuti SF, Gardiner C, Lynn C, Kruus P. TinyPK: securing sensor networks with public key technology. Second workshop on Security in Sensor and Ad-hoc Networks, 2004.
-
(2004)
-
-
Watro, R.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
63
-
-
3543100577
-
-
Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE Infocom
-
Ye F, Luo H, Lu S, Zhang L. Statistical en-route detection and filtering of injected false data in sensor networks. In Proceedings of IEEE Infocom, 2004.
-
(2004)
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
64
-
-
30344482882
-
INSENS: intrusion-tolerant routing for wireless sensor networks
-
Deng J, Han R, Mishra S. INSENS: intrusion-tolerant routing for wireless sensor networks. Journal of Computer Communications 2006; 29(2):216-230.
-
(2006)
Journal of Computer Communications
, vol.29
, Issue.2
, pp. 216-230
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
65
-
-
79953171081
-
Intertemporal discount factors as a measure of trustworthiness in electronic commerce
-
Hazard CJ, Singh MP. Intertemporal discount factors as a measure of trustworthiness in electronic commerce. IEEE Transactions on Knowledge and Data Engineering 2011; 23(5):699-721.
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
, vol.23
, Issue.5
, pp. 699-721
-
-
Hazard, C.J.1
Singh, M.P.2
-
66
-
-
77954862343
-
Clarifying the integration of trust and TAM in e-commerce environments: implications for systems design and management
-
Benamati J, Fuller MA, Serva MA, Baroudi J. Clarifying the integration of trust and TAM in e-commerce environments: implications for systems design and management. IEEE Transactions on Engineering Management 2010; 57(3):380-393.
-
(2010)
IEEE Transactions on Engineering Management
, vol.57
, Issue.3
, pp. 380-393
-
-
Benamati, J.1
Fuller, M.A.2
Serva, M.A.3
Baroudi, J.4
-
67
-
-
56449109901
-
Providing justifications in recommender systems
-
Symeonidis P, Nanopoulos A, Manolopoulos Y. Providing justifications in recommender systems. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 2008; 38(6):1262-1272.
-
(2008)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.38
, Issue.6
, pp. 1262-1272
-
-
Symeonidis, P.1
Nanopoulos, A.2
Manolopoulos, Y.3
-
68
-
-
47649116292
-
Reputation-oriented trustworthy computing in e-commerce environments
-
Wang Y, Lin K. Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Computing 2008; 12(4):55-59.
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.4
, pp. 55-59
-
-
Wang, Y.1
Lin, K.2
-
69
-
-
84876806804
-
-
The beta reputation system. The 15th Bled Electronic Commerce Conference, Slovenia
-
Josang A, Ismail R. The beta reputation system. The 15th Bled Electronic Commerce Conference, Slovenia, 2002.
-
(2002)
-
-
Josang, A.1
Ismail, R.2
-
70
-
-
0002101577
-
Reputation systems
-
Resnick P, Kuwabara K, Zeckhauser R, Friedman E. Reputation systems. Communications of the ACM 2000; 43(12):45-48.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
72
-
-
79951837447
-
Exploiting trust-based social networks for distributed protection of sensitive data
-
Xu S, Li X, Parker TP, Wang X. Exploiting trust-based social networks for distributed protection of sensitive data. IEEE Transactions on Information Forensics and Security 2011; 6(1):39-52.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 39-52
-
-
Xu, S.1
Li, X.2
Parker, T.P.3
Wang, X.4
-
73
-
-
78149431890
-
Situation-aware trust architecture for vehicular networks
-
Dijiang H, Xiaoyan H, Gerla M. Situation-aware trust architecture for vehicular networks. IEEE Communications Magazine 2010; 48(11):128-135.
-
(2010)
IEEE Communications Magazine
, vol.48
, Issue.11
, pp. 128-135
-
-
Dijiang, H.1
Xiaoyan, H.2
Gerla, M.3
-
74
-
-
72949088489
-
Safebook: a privacy-preserving online social network leveraging on real-life trust
-
Cutillo LA, Molva R, Strufe T. Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 2009; 47(12):94-101.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
-
75
-
-
63349097435
-
Social search: exploring and searching social architectures in digital networks
-
Trier M, Bobrik A. Social search: exploring and searching social architectures in digital networks. IEEE Internet Computing 2009; 13(2):51-59.
-
(2009)
IEEE Internet Computing
, vol.13
, Issue.2
, pp. 51-59
-
-
Trier, M.1
Bobrik, A.2
-
77
-
-
0033903726
-
-
Supporting trust in virtual communities. 33rd Hawaii International Conference on System Sciences, Hawaii
-
Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. 33rd Hawaii International Conference on System Sciences, Hawaii, 2000.
-
(2000)
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
78
-
-
80053280690
-
Parameter-estimation based trust model for unstructured peer-to-peer networks
-
Chen S, Zhang Y, Yang G. Parameter-estimation based trust model for unstructured peer-to-peer networks. IET Communications 2011; 5(7):922-928.
-
(2011)
IET Communications
, vol.5
, Issue.7
, pp. 922-928
-
-
Chen, S.1
Zhang, Y.2
Yang, G.3
-
81
-
-
34047150751
-
PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing
-
Zhou R, Hwang K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems 2007; 18(5):1-14.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.5
, pp. 1-14
-
-
Zhou, R.1
Hwang, K.2
-
82
-
-
33646885897
-
Trust-based privacy preservation for peer-to-peer data sharing
-
Lu Y, Wang W, Bhargava B, Xu D. Trust-based privacy preservation for peer-to-peer data sharing. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 2006; 36(3):498-502.
-
(2006)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.36
, Issue.3
, pp. 498-502
-
-
Lu, Y.1
Wang, W.2
Bhargava, B.3
Xu, D.4
-
83
-
-
3142738238
-
PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities
-
Xiong L, Liu L. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 2004; 16(7):843-857.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
84
-
-
79957745240
-
Reputation-based trust for a cooperative agent-based backup protection scheme
-
Borowski JF, Hopkinson KM, Humphries JW, Borghetti BJ. Reputation-based trust for a cooperative agent-based backup protection scheme. IEEE Transactions on Smart Grid 2011; 2(2):287-301.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.2
, pp. 287-301
-
-
Borowski, J.F.1
Hopkinson, K.M.2
Humphries, J.W.3
Borghetti, B.J.4
-
85
-
-
63049083674
-
QGrid: an adaptive trust aware resource management framework
-
Lin L, Huai J. QGrid: an adaptive trust aware resource management framework. IEEE Systems Journal 2009; 3(1):78-90.
-
(2009)
IEEE Systems Journal
, vol.3
, Issue.1
, pp. 78-90
-
-
Lin, L.1
Huai, J.2
-
86
-
-
63449126327
-
Enhancing privacy and authorization control scalability in the grid through ontologies
-
Blanquer I, Hernandez V, Segrelles D, Torres E. Enhancing privacy and authorization control scalability in the grid through ontologies. IEEE Transactions on Information Technology in Biomedicine 2009; 13(1):16-24.
-
(2009)
IEEE Transactions on Information Technology in Biomedicine
, vol.13
, Issue.1
, pp. 16-24
-
-
Blanquer, I.1
Hernandez, V.2
Segrelles, D.3
Torres, E.4
-
87
-
-
33646486528
-
Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling
-
Song S, Hwang K, Kwok Y. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Transactions on Computers 2006; 55(6):703-719.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.6
, pp. 703-719
-
-
Song, S.1
Hwang, K.2
Kwok, Y.3
-
88
-
-
28844464697
-
Trusted grid computing with security binding and trust integration
-
Song S, Hwang K, Kwok Y. Trusted grid computing with security binding and trust integration. Journal of Grid Computing 2005; 3(1-2):53-73.
-
(2005)
Journal of Grid Computing
, vol.3
, Issue.1-2
, pp. 53-73
-
-
Song, S.1
Hwang, K.2
Kwok, Y.3
-
89
-
-
79955684217
-
-
Dynamic trust model for reliable transactions in multi-agent systems. 13th International Conference on Advanced Communication Technology (ICACT)
-
Das A, Islam MM, Sorwar G. Dynamic trust model for reliable transactions in multi-agent systems. 13th International Conference on Advanced Communication Technology (ICACT), 2011; 1101-1106.
-
(2011)
, pp. 1101-1106
-
-
Das, A.1
Islam, M.M.2
Sorwar, G.3
-
90
-
-
77957665224
-
-
Trust opportunistic routing protocol in multi-hop wireless networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)
-
Wang B, Huang C, Yang W, Wang T. Trust opportunistic routing protocol in multi-hop wireless networks. IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010; 563-567.
-
(2010)
, pp. 563-567
-
-
Wang, B.1
Huang, C.2
Yang, W.3
Wang, T.4
-
91
-
-
77954254371
-
-
Trust management in opportunistic networks. 9th International Conference on Networks (ICN)
-
Goncalves MRP, Moreira EDS, Martimiano LAF. Trust management in opportunistic networks. 9th International Conference on Networks (ICN), 2010; 209-214.
-
(2010)
, pp. 209-214
-
-
Goncalves, M.R.P.1
Moreira, E.D.S.2
Martimiano, L.A.F.3
-
92
-
-
77951433690
-
-
Trust management in opportunistic pervasive healthcare systems. 16th IEEE International Conference on Electronics, Circuits and Systems (ICECS)
-
Denko MK, Woungang I, Obaidat MS. Trust management in opportunistic pervasive healthcare systems. 16th IEEE International Conference on Electronics, Circuits and Systems (ICECS), 2009; 832-835.
-
(2009)
, pp. 832-835
-
-
Denko, M.K.1
Woungang, I.2
Obaidat, M.S.3
-
93
-
-
35148895900
-
-
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
-
Chen H, Zhou X, Gao C. Agent-based trust model in wireless sensor networks. 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007; 119-124.
-
(2007)
Agent-based trust model in wireless sensor networks
, pp. 119-124
-
-
Chen, H.1
Zhou, X.2
Gao, C.3
-
94
-
-
77954320949
-
Towards a trust aware cognitive radio architecture
-
Qin T, Yu H, Leung C, Shen Z, Miao C. Towards a trust aware cognitive radio architecture. ACM Sigmobile Mobile Computing and Communications 2009; 13(2):86-95.
-
(2009)
ACM Sigmobile Mobile Computing and Communications
, vol.13
, Issue.2
, pp. 86-95
-
-
Qin, T.1
Yu, H.2
Leung, C.3
Shen, Z.4
Miao, C.5
-
95
-
-
84911875895
-
A survey of key distribution in wireless sensor networks
-
DOI: 10.1002/sec.354, article first published online, July
-
Chen C-Y, Chao H-C. A survey of key distribution in wireless sensor networks. Security and Communication Networks. DOI: 10.1002/sec.354, article first published online, July 2011.
-
(2011)
Security and Communication Networks
-
-
Chen, C.-Y.1
Chao, H.-C.2
|