-
1
-
-
84877918525
-
-
Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501 (Informational), January
-
Corson S Macker J. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501 (Informational), January 1999.
-
(1999)
-
-
Corson, S.1
Macker, J.2
-
2
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang A, Ismail R Boyd C. A survey of trust and reputation systems for online service provision. Decision Support Systems 2007; 43(2): 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
5
-
-
84949942881
-
-
The right type of trust for distributed systems. In NSPW '96: Proceedings of the 1996 workshop on New security paradigms, ACM Press, New York, NY, USA
-
Jøsang A. The right type of trust for distributed systems. In NSPW '96: Proceedings of the 1996 workshop on New security paradigms, ACM Press, New York, NY, USA, 1996; 119-131.
-
(1996)
, pp. 119-131
-
-
Jøsang, A.1
-
6
-
-
84928468012
-
Trust and distrust definitions: One bite at a time
-
In, Springer-Verlag, London, UK
-
McKnight DH Chervany NL. Trust and distrust definitions: One bite at a time. In Trust in Cyber-societites, Integrating the Human and Artificial Perspectives, Springer-Verlag, London, UK, 2000; 27-54.
-
(2000)
Trust in Cyber-societites, Integrating the Human and Artificial Perspectives
, pp. 27-54
-
-
McKnight, D.H.1
Chervany, N.L.2
-
9
-
-
3042683143
-
-
Cooperation issues in mobile ad hoc networks. In ICDCSW '04: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops-W7: EC (ICDCSW'04), IEEE Computer Society, Washington, DC, USA
-
Conti M, Gregori E Maselli G. Cooperation issues in mobile ad hoc networks. In ICDCSW '04: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops-W7: EC (ICDCSW'04), IEEE Computer Society, Washington, DC, USA, 2004; 803-808.
-
(2004)
, pp. 803-808
-
-
Conti, M.1
Gregori, E.2
Maselli, G.3
-
10
-
-
84877900840
-
-
A distributed trust model. In NSPW '97: Proceedings of the 1997 workshop on New security paradigms, ACM Press, New York, NY, USA
-
Abdul-Rahman A Hailes S. A distributed trust model. In NSPW '97: Proceedings of the 1997 workshop on New security paradigms, ACM Press, New York, NY, USA, 1997; 48-60.
-
(1997)
, pp. 48-60
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
11
-
-
0033357103
-
Securing Ad Hoc Networks
-
Zhou L Haas ZJ. Securing Ad Hoc Networks. IEEE Network 1999; 13(6): 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
12
-
-
0035789229
-
-
The quest for security in mobile ad hoc networks. In MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, ACM Press, New York, NY, USA
-
Hubaux J-P, Buttyán L Capkun S. The quest for security in mobile ad hoc networks. In MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, ACM Press, New York, NY, USA, 2001; 146-155.
-
(2001)
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
13
-
-
85094162508
-
-
Supporting trust in virtual communities. In HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6, IEEE Computer Society, Washington, DC, USA
-
Abdul-Rahman Al Hailes S. Supporting trust in virtual communities. In HICSS '00: Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6, IEEE Computer Society, Washington, DC, USA, 2000; 6007.
-
(2000)
, pp. 6007
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
14
-
-
84877890249
-
-
An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security (NDSS'99)
-
Jøsang A. An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security (NDSS'99), 1999.
-
(1999)
-
-
Jøsang, A.1
-
15
-
-
84877896011
-
-
A metric for trusted systems. In Proceedings of 21st National Security Conference
-
Jøsang A Knapskog S. A metric for trusted systems. In Proceedings of 21st National Security Conference, 1998; 16-29.
-
(1998)
, pp. 16-29
-
-
Jøsang, A.1
Knapskog, S.2
-
16
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
Finin T, Kagal L Joshi A. Trust-based security in pervasive computing environments. Computer 2001; 34: 154-157.
-
(2001)
Computer
, vol.34
, pp. 154-157
-
-
Finin, T.1
Kagal, L.2
Joshi, A.3
-
17
-
-
84877896886
-
-
Towards a framework for assessing trust-based admission control in collaborative ad hoc applications. Technical Report TCD-CS-2002-66, Trinity College Dublin
-
Gray E, O'Connell P, Jensen CD, Weber S, Seigneur JM Chen Y. Towards a framework for assessing trust-based admission control in collaborative ad hoc applications. Technical Report TCD-CS-2002-66, Trinity College Dublin, 2002.
-
(2002)
-
-
Gray, E.1
O'Connell, P.2
Jensen, C.D.3
Weber, S.4
Seigneur, J.M.5
Chen, Y.6
-
18
-
-
5544326539
-
Trust for ubiquitous, transparent collaboration
-
Shand B, Dimmock N Bacon J. Trust for ubiquitous, transparent collaboration. Wireless Networks 2004; 10(6): 711-721.
-
(2004)
Wireless Networks
, vol.10
, Issue.6
, pp. 711-721
-
-
Shand, B.1
Dimmock, N.2
Bacon, J.3
-
20
-
-
84877910631
-
-
Talking to strangers: authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02), San Diego, CA, February
-
Balfanz D, Smetters DK, Stewart P Wong HC. Talking to strangers: authentication in ad-hoc wireless networks. In Proceedings of Network and Distributed System Security Symposium 2002 (NDSS'02), San Diego, CA, February 2002.
-
(2002)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
21
-
-
0036986441
-
-
An on-demand secure routing protocol resilient to byzantine failures. In Proceedings of the ACM Workshop on Wireless Security, Atlanta, Georgia, USA, September 28, 2002, Maughan D, Vaidya N (eds), ACM Press
-
Awerbuch B, Holmer D, Nita-Rotaru C Rubens H. An on-demand secure routing protocol resilient to byzantine failures. In Proceedings of the ACM Workshop on Wireless Security, Atlanta, Georgia, USA, September 28, 2002, Maughan D, Vaidya N (eds), ACM Press, 2002; 21-30.
-
(2002)
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
24
-
-
84954161437
-
-
Enforcing service availability in mobile ad-hoc wans. In Proceedings of the 1st ACM International Symposium on Mobile ad hoc Networking & Computing MobiHoc '00, ACM Press, Boston, MA, US, 11 August
-
Buttyán L, Hubaux J-P. Enforcing service availability in mobile ad-hoc wans. In Proceedings of the 1st ACM International Symposium on Mobile ad hoc Networking & Computing MobiHoc '00, ACM Press, Boston, MA, US, 11 August 2000; 87-96.
-
(2000)
, pp. 87-96
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
25
-
-
0042660545
-
Stimulating cooperation in self-organising mobile ad hoc networks
-
Buttyán L, Hubaux J-P. Stimulating cooperation in self-organising mobile ad hoc networks. Mobile Networks and Applications (MONET) 2003; 8(5): 579-592.
-
(2003)
Mobile Networks and Applications (MONET)
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
26
-
-
0042933944
-
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), Vol. 3, IEEE Press, San Francisco, CA, 1-3 April
-
Zhong S, Chen J Yang YR. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), Vol. 3, IEEE Press, San Francisco, CA, 1-3 April 2003; 1987-1997.
-
(2003)
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
27
-
-
1542299118
-
-
Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the Nineth Annual International Conference on Mobile Computing and Networking, MobiCom '03, Haas ZJ, Das SR, Jain R (eds), ACM Press, San Diego, CA, US, 14-19 September
-
Anderegg L Eidenbenz S. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the Nineth Annual International Conference on Mobile Computing and Networking, MobiCom '03, Haas ZJ, Das SR, Jain R (eds), ACM Press, San Diego, CA, US, 14-19 September 2003; 245-259.
-
(2003)
, pp. 245-259
-
-
Anderegg, L.1
Eidenbenz, S.2
-
28
-
-
84877905235
-
-
Priority forwarding in ad hoc networks with self-interested parties. In Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkley, CA, 5-6 June 2003, June
-
Raghavan B Snoeren AC. Priority forwarding in ad hoc networks with self-interested parties. In Proceedings of the First Workshop on Economics of Peer-to-Peer Systems, Berkley, CA, 5-6 June 2003, June 2003.
-
(2003)
-
-
Raghavan, B.1
Snoeren, A.C.2
-
29
-
-
84877897487
-
-
A robust reputation system for P2P and mobile ad hoc networks. In Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, P2PEcon 2004, Harvard University Press, Cambridge, MA, US, 4-5 June
-
Buchegger S, Le Boudec J-Y. A robust reputation system for P2P and mobile ad hoc networks. In Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, P2PEcon 2004, Harvard University Press, Cambridge, MA, US, 4-5 June 2004; 403-410.
-
(2004)
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
31
-
-
33846609555
-
-
Notions of reputation in multi-agents systems: a review. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, Gini M, Ishida T, Castelfranchi C, Johnson W (eds), ACM Press, Bologna, Italy, 15-19 July
-
Mui L, Mohtashemi M Halberstadt A. Notions of reputation in multi-agents systems: a review. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, Gini M, Ishida T, Castelfranchi C, Johnson W (eds), ACM Press, Bologna, Italy, 15-19 July 2002; 280-287.
-
(2002)
, pp. 280-287
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
32
-
-
34547637688
-
Trust among strangers in internet transactions: empirical analysis of ebay's reputation system
-
In, Baye M (ed.), Elsevier Science Ltd.
-
Resnick P Zeckhauser R. Trust among strangers in internet transactions: empirical analysis of ebay's reputation system. In Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce, Vol. 11, Baye M (ed.), Elsevier Science Ltd.; 127-157.
-
Advances in Applied Microeconomics: The Economics of the Internet and E-Commerce
, vol.11
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
33
-
-
84955569588
-
-
A security architecure for reputation systems. In E-Commerce and Web Technologies-Fourth International Conference, EC-Web 2003, Prague, Czech Republic, September 2-5, 2003, Bauknecht K, Tjoa AM, Quirchmayr G (eds), Springer-Verlag (LNCS 2738).
-
Ismail R, Boyd C, Josang A Russell S. A security architecure for reputation systems. In E-Commerce and Web Technologies-Fourth International Conference, EC-Web 2003, Prague, Czech Republic, September 2-5, 2003, Bauknecht K, Tjoa AM, Quirchmayr G (eds), Springer-Verlag (LNCS 2738); 176-185.
-
-
-
Ismail, R.1
Boyd, C.2
Josang, A.3
Russell, S.4
-
34
-
-
0034541756
-
-
Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual ACM/IEEE international conference on Mobile Computing and Networking, MobiCom '00, Pickholtz R, Das S, Caceres R, Garcia-Luna-Aceves J. (eds), ACM Press, Boston, MA, US, 6-11 August
-
Marti S, Giuli TJ, Lai K Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual ACM/IEEE international conference on Mobile Computing and Networking, MobiCom '00, Pickholtz R, Das S, Caceres R, Garcia-Luna-Aceves J. (eds), ACM Press, Boston, MA, US, 6-11 August 2000; 255-265.
-
(2000)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
35
-
-
84877907425
-
-
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing PDP, Euromicro, Las Palmas de Gran Canaria, Canary Island, Spain, 9-11 January
-
Buchegger S, Le Boudec J-Y. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing PDP, Euromicro, Las Palmas de Gran Canaria, Canary Island, Spain, 9-11 January 2002; 403-410.
-
(2002)
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
36
-
-
0242696192
-
-
Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hubaux J, Garcia-Luna-Aceves JJ, Johnson D (eds), ACM Press, Lausanne, Switzerland, 9-11 June
-
Buchegger S, Le Boudec J-Y. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hubaux J, Garcia-Luna-Aceves JJ, Johnson D (eds), ACM Press, Lausanne, Switzerland, 9-11 June 2002; 26-236.
-
(2002)
, pp. 26-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
37
-
-
84877881947
-
Self-policing mobile ad hoc networks
-
Ilyas M, Mahgoub I (eds). CRC Press: Florida, USA
-
Buchegger S, Le Boudec J-Y. Self-policing mobile ad hoc networks. Mobile Computing Handbook, Ilyas M, Mahgoub I (eds). CRC Press: Florida, USA, 2004; 435-456.
-
(2004)
Mobile Computing Handbook
, pp. 435-456
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
38
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems
-
Buchegger S, Le Boudec J-Y. Self-policing mobile ad hoc networks by reputation systems. Communications Magazine, IEEE 2005; 43(7): 101-107.
-
(2005)
Communications Magazine, IEEE
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
39
-
-
85113133621
-
CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
In, Vol., Jerman-Blazic B, Klobucar T (eds), Kluwer Academic, Portoroz, Slovenia, 26-27 September
-
Michiardi P Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, Vol. 228, Jerman-Blazic B, Klobucar T (eds), Kluwer Academic, Portoroz, Slovenia, 26-27 September 2002; 107-121.
-
(2002)
Communications and Multimedia Security,IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security
, vol.228
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
40
-
-
84877910253
-
-
Game theoretical analysis of security in ad hoc networks. Technical Report RR-02-070, Institute Eurécom, April
-
Michiardi P Molva R. Game theoretical analysis of security in ad hoc networks. Technical Report RR-02-070, Institute Eurécom, April 2002.
-
(2002)
-
-
Michiardi, P.1
Molva, R.2
-
41
-
-
84877913230
-
-
Making greed work in ad hoc networks. Technical Report RR-02-069, Institute Eurécom, March
-
Michiardi P Molva R. Making greed work in ad hoc networks. Technical Report RR-02-069, Institute Eurécom, March 2002.
-
(2002)
-
-
Michiardi, P.1
Molva, R.2
-
42
-
-
84877916646
-
-
Prevention of denial of service attacks and selfishness in mobile ad hoc networks. Technical Report RR-02-063, Institute Eurécom, January
-
Michiardi P Molva R. Prevention of denial of service attacks and selfishness in mobile ad hoc networks. Technical Report RR-02-063, Institute Eurécom, January 2002.
-
(2002)
-
-
Michiardi, P.1
Molva, R.2
-
43
-
-
6344245579
-
Towards the security of routing in ad hoc networks
-
chapter 10, Mitchell CJ (ed.). IEE Press: Stevenage, UK
-
Yau P Sdralia V. Towards the security of routing in ad hoc networks. Security for Mobility, chapter 10, Mitchell CJ (ed.). IEE Press: Stevenage, UK, 2004; 231-268.
-
(2004)
Security for Mobility
, pp. 231-268
-
-
Yau, P.1
Sdralia, V.2
-
44
-
-
4544283175
-
-
SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of the Third IEEE Wireless Communications and Networking Conference, WCNC 04, Vol. 2, IEEE Press, Atlanta, GA, US, 21-25 March
-
He Q, Wu D Khosla P. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of the Third IEEE Wireless Communications and Networking Conference, WCNC 04, Vol. 2, IEEE Press, Atlanta, GA, US, 21-25 March 2004; 825-830.
-
(2004)
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
46
-
-
33749992235
-
-
Towards reliable forwarding in mobile ad hoc networks. In Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC 2003, Springer-Verlag (LNCS 2775), Venice, Italy, 23-25 September
-
Conti M, Gregori E Maselli G. Towards reliable forwarding in mobile ad hoc networks. In Personal Wireless Communications: IFIP-TC6 8th International Conference, PWC 2003, Springer-Verlag (LNCS 2775), Venice, Italy, 23-25 September 2003; 790-804.
-
(2003)
, pp. 790-804
-
-
Conti, M.1
Gregori, E.2
Maselli, G.3
-
47
-
-
84943576414
-
-
Friends and foes: Preventing selfishness in open mobile ad hoc networks. In Proceedings of the First International Workshop on Mobile Distributed Computing, MDC '03, IEEE Press, Rhode Island, US, 19 May
-
Miranda H Rodrigues L. Friends and foes: Preventing selfishness in open mobile ad hoc networks. In Proceedings of the First International Workshop on Mobile Distributed Computing, MDC '03, IEEE Press, Rhode Island, US, 19 May 2003; 440-445.
-
(2003)
, pp. 440-445
-
-
Miranda, H.1
Rodrigues, L.2
-
48
-
-
0036969459
-
-
Context aware detection of selfish nodes in DSR based ad-hoc networks. In Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM '02, Vol. 1, IEEE Press, Taipei, Taiwan, 17-21 November
-
Paul K Westhoff D. Context aware detection of selfish nodes in DSR based ad-hoc networks. In Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM '02, Vol. 1, IEEE Press, Taipei, Taiwan, 17-21 November 2002; 186-190.
-
(2002)
, pp. 186-190
-
-
Paul, K.1
Westhoff, D.2
-
49
-
-
24944524211
-
-
Can we manage trust? In Trust Management: Third International Conference, iTrust 2005, Herrmann P, Issarny V, Shiu S (eds), Paris, France, 23-26 May
-
Jøsang A, Keser C Dimitrakos T. Can we manage trust? In Trust Management: Third International Conference, iTrust 2005, Herrmann P, Issarny V, Shiu S (eds), Paris, France, 23-26 May 2005; 93-107.
-
(2005)
, pp. 93-107
-
-
Jøsang, A.1
Keser, C.2
Dimitrakos, T.3
-
50
-
-
34547587401
-
-
Reputation methods for routing security for mobile ad hoc networks. In Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, IEEE Press, Bratislava, Slovakia, 26-28 October
-
Yau P Mitchell CJ. Reputation methods for routing security for mobile ad hoc networks. In Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, IEEE Press, Bratislava, Slovakia, 26-28 October 2003; 130-137.
-
(2003)
, pp. 130-137
-
-
Yau, P.1
Mitchell, C.J.2
-
51
-
-
80052897731
-
Examining trust, forgiveness and regret as computational concepts
-
In Computing with Social Trust, chapter 2, Goldbeck J (ed.). Springer: London
-
Marsh S Briggs P. Examining trust, forgiveness and regret as computational concepts. In Computing with Social Trust, chapter 2, Goldbeck J (ed.). Springer: London, 2008; 9-44.
-
(2008)
, pp. 9-44
-
-
Marsh, S.1
Briggs, P.2
-
52
-
-
24944486508
-
-
Reinventing forgiveness: a formal investigation of moral facilitation. In Trust Management: Third International Conference, iTrust 2005, Herrmann P, Issarny V, Shiu S (eds), Springer-Verlag (LNCS 3477), Paris, France, 23-26 May
-
Vasalou A Pitt J. Reinventing forgiveness: a formal investigation of moral facilitation. In Trust Management: Third International Conference, iTrust 2005, Herrmann P, Issarny V, Shiu S (eds), Springer-Verlag (LNCS 3477), Paris, France, 23-26 May 2005; 146-160.
-
(2005)
, pp. 146-160
-
-
Vasalou, A.1
Pitt, J.2
-
53
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Hu YC Perrig A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2004; 2(3): 28-39.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.C.1
Perrig, A.2
-
54
-
-
0041973497
-
-
Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocomm 2003, April
-
Hu Y-C, Perrig A Johnson DB. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocomm 2003, April 2003.
-
(2003)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
55
-
-
1542317831
-
-
Rushing attacks and defense in wireless ad hoc network routing protocols. In WiSe '03: Proceedings of the 2003 ACM workshop on Wireless security, ACM Press, New York, NY, USA
-
Hu Y-C, Perrig A Johnson DB. Rushing attacks and defense in wireless ad hoc network routing protocols. In WiSe '03: Proceedings of the 2003 ACM workshop on Wireless security, ACM Press, New York, NY, USA, 2003; 30-40.
-
(2003)
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
56
-
-
84947273682
-
The sybil attack
-
In, LNCS, Druschel P, Kaashoek MF Rowstron AI. (eds), Vol., Springer
-
Douceur JR. The sybil attack. In Peer-to-Peer systems, First International Workshop, IPTPS 2002, LNCS, Druschel P, Kaashoek MF Rowstron AI. (eds), Vol. 2429, Springer, 2002; 251-256.
-
(2002)
Peer-to-Peer systems, First International Workshop, IPTPS 2002
, vol.2429
, pp. 251-256
-
-
Douceur, J.R.1
-
57
-
-
3042785862
-
-
The sybil attack in sensor networks: analysis & defenses. In IPSN '04: Proceedings of the third international symposium on Information processing in sensor networks, ACM Press, New York, NY, USA
-
Newsome J, Shi E, Song D Perrig A. The sybil attack in sensor networks: analysis & defenses. In IPSN '04: Proceedings of the third international symposium on Information processing in sensor networks, ACM Press, New York, NY, USA, 2004; 259-268.
-
(2004)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
58
-
-
27544460282
-
-
Distributed detection of node replication attacks in sensor networks. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA
-
Parno B, Perrig A Gligor V. Distributed detection of node replication attacks in sensor networks. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 2005; 49-63.
-
(2005)
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.3
-
59
-
-
0001831930
-
-
The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols.
-
Stajano F Anderson RJ. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Proceedings of the 7th International Workshop on Security Protocols; 172-194.
-
-
-
Stajano, F.1
Anderson, R.J.2
-
60
-
-
84877897909
-
-
The sleep deprivation attack in sensor networks: Analysis and methods of defense. In Conference on Innovations and Commercial Applications of Distributed Sensor Networks, page to appear, October Best Paper Award.
-
Vijaykrishnan N, McDaniel P, Kandemir M, Pirretti M, Zhu S Brooks R. The sleep deprivation attack in sensor networks: Analysis and methods of defense. In Conference on Innovations and Commercial Applications of Distributed Sensor Networks, page to appear, October 2005. Best Paper Award.
-
(2005)
-
-
Vijaykrishnan, N.1
McDaniel, P.2
Kandemir, M.3
Pirretti, M.4
Zhu, S.5
Brooks, R.6
-
61
-
-
0038341106
-
-
A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, New York, NY, USA
-
Eschenauer L Gligor VD. A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, New York, NY, USA, 2002; 41-47.
-
(2002)
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
62
-
-
0038487088
-
-
Random key predistribution schemes for sensor networks. In SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA
-
Chan H, Perrig A Song D. Random key predistribution schemes for sensor networks. In SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 2003; 197.
-
(2003)
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
63
-
-
33751426159
-
-
Performance analysis of scalable certificate revocation schemes for ad hoc networks. In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, IEEE Computer Society, Washington, DC, USA
-
Eichler S Muller-Rathgeber B. Performance analysis of scalable certificate revocation schemes for ad hoc networks. In LCN '05: Proceedings of the The IEEE Conference on Local Computer Networks 30th Anniversary, IEEE Computer Society, Washington, DC, USA, 2005; 382-391.
-
(2005)
, pp. 382-391
-
-
Eichler, S.1
Muller-Rathgeber, B.2
-
64
-
-
84877915077
-
-
Performance evaluation on crl distribution using flooding in mobile ad hoc networks (manets). In ACM-SE 43: Proceedings of the 43rd annual Southeast regional conference, ACM Press, New York, NY, USA
-
Go HW, Chan PY, Dong Y, et al. Performance evaluation on crl distribution using flooding in mobile ad hoc networks (manets). In ACM-SE 43: Proceedings of the 43rd annual Southeast regional conference, ACM Press, New York, NY, USA, 2005; 75-80.
-
(2005)
, pp. 75-80
-
-
Go, H.W.1
Chan, P.Y.2
Dong, Y.3
-
65
-
-
33749611163
-
Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
-
Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada
-
Hoeper K Gong G. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation. Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada, 2006.
-
(2006)
Technical Report CACR 2006-04
-
-
Hoeper, K.1
Gong, G.2
-
66
-
-
27744582346
-
-
Toward hierarchical identity-based cryptography for tactical networks. In MILCOM '03: Proceedings of the 2004 Military Communications Conference. IEEE Computer Society
-
Matt BJ. Toward hierarchical identity-based cryptography for tactical networks. In MILCOM '03: Proceedings of the 2004 Military Communications Conference. IEEE Computer Society, 2004.
-
(2004)
-
-
Matt, B.J.1
-
67
-
-
24144449947
-
-
AC-PKI: anonymous and Certificateless Public Key Infrastructure for Mobile Ad Hoc Networks. In ICC 2005: Proceedings of the International Conference on Communications, IEEE Computer Society
-
Zhang Y, Liu W, Lou W, Fang Y Kwon Y. AC-PKI: anonymous and Certificateless Public Key Infrastructure for Mobile Ad Hoc Networks. In ICC 2005: Proceedings of the International Conference on Communications, IEEE Computer Society, 2005.
-
(2005)
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
Kwon, Y.5
-
68
-
-
84874324906
-
-
Identity-based encryption from the weil pairing. In CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK
-
Boneh D Franklin MK. Identity-based encryption from the weil pairing. In CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK, 2001; 213-229.
-
(2001)
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
70
-
-
4544374484
-
-
A certificate revocation scheme for wireless ad hoc networks. In SASN '03: Proceedings of the First ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York, NY, USA
-
Crépeau C Davis CR. A certificate revocation scheme for wireless ad hoc networks. In SASN '03: Proceedings of the First ACM workshop on Security of ad hoc and sensor networks, ACM Press, New York, NY, USA, 2003; 54-61.
-
(2003)
, pp. 54-61
-
-
Crépeau, C.1
Davis, C.R.2
-
71
-
-
84883869163
-
-
Self-securing ad hoc wireless networks. In ISCC '02: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02), IEEE Computer Society, Washington, DC, USA
-
Luo H, Zerfos P, Kong J, Lu S Zhang L. Self-securing ad hoc wireless networks. In ISCC '02: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02), IEEE Computer Society, Washington, DC, USA, 2002; 567-574.
-
(2002)
, pp. 567-574
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
72
-
-
84947273682
-
The Sybil Attack
-
booktitle =, Springer-Verlag, London, UK
-
Douceur JR. The Sybil Attack, booktitle = IPTPS '01: revised papers from the first international workshop on peer-to-peer systems, Springer-Verlag, London, UK, 2002; 251-260.
-
(2002)
IPTPS '01: revised papers from the first international workshop on peer-to-peer systems
, pp. 251-260
-
-
Douceur, J.R.1
-
73
-
-
33748079781
-
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
-
Clulow J Moore T. Suicide for the common good: a new strategy for credential revocation in self-organizing systems. SIGOPS Operating Systems Review 2006; 40(3): 18-21.
-
(2006)
SIGOPS Operating Systems Review
, vol.40
, Issue.3
, pp. 18-21
-
-
Clulow, J.1
Moore, T.2
-
74
-
-
84877888560
-
-
New strategies for revocation in ad-hoc networks. In ESAS '07: Proceedings of the Fourth European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, July
-
Anderson R, Moore T, Clulow J Nagaraja S. New strategies for revocation in ad-hoc networks. In ESAS '07: Proceedings of the Fourth European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, July 2007.
-
(2007)
-
-
Anderson, R.1
Moore, T.2
Clulow, J.3
Nagaraja, S.4
-
75
-
-
33745884824
-
Trust, untrust, distrust and mistrust-an exploration of the dark(er) side
-
In, Herrmann P, Issarny V, Shiu S (eds), Springer-Verlag (LNCS 3477), Paris, France, 23-26 May
-
Marsh S Dibben MR. Trust, untrust, distrust and mistrust-an exploration of the dark(er) side. In Trust Management: Third International Conference, iTrust 2005, Herrmann P, Issarny V, Shiu S (eds), Springer-Verlag (LNCS 3477), Paris, France, 23-26 May 2005; 7-33.
-
(2005)
Trust Management: Third International Conference, iTrust 2005
, pp. 7-33
-
-
Marsh, S.1
Dibben, M.R.2
|