-
1
-
-
80053572205
-
Trustbased trustbased minimum cost opportunistic routing for Ad Hoc networks
-
Wang B., Huang C. H., Li L. Y., Yang W. Z., Trustbased trustbased minimum cost opportunistic routing for Ad Hoc networks. Journal of Systems and Software 2011 84 12 2107 2122
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.12
, pp. 2107-2122
-
-
Wang, B.1
Huang, C.H.2
Li, L.Y.3
Yang, W.Z.4
-
3
-
-
0000629443
-
Dynamic source routing in Ad Hoc wireless networks
-
Johnson D. B., Maltz D. A., Dynamic source routing in Ad Hoc wireless networks. Mobile Computing 1996 353 153 181
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
6
-
-
79961145911
-
A Subjective Trust Management Model Based on AHP for MANETs
-
May 2011 Guilin, China 2-s2.0-79961145911 10.1109/NCIS.2011.80
-
Xia H., Jia Z. P., Li X., Zhang F., A subjective trust management model based on AHP for MANETs. 1 Proceedings of the International Conference on Network Computing and Information Security (NCIS '11) May 2011 Guilin, China 363 368 2-s2.0-79961145911 10.1109/NCIS.2011.80
-
Proceedings of the International Conference on Network Computing and Information Security (NCIS '11)
, vol.1
, pp. 363-368
-
-
Xia, H.1
Jia, Z.P.2
Li, X.3
Zhang, F.4
-
7
-
-
63149130883
-
Voting-based clustering algorithm with subjective trust and stability in mobile Ad-Hoc networks
-
December 2008 Shanghai, China 2-s2.0-63149130883 10.1109/EUC.2008.93
-
Peng S. C., Jia W. J., Wang G. J., Voting-based clustering algorithm with subjective trust and stability in mobile Ad-Hoc networks. 2 Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (EUC '08) December 2008 Shanghai, China 3 9 2-s2.0-63149130883 10.1109/EUC.2008.93
-
Proceedings of the 5th International Conference on Embedded and Ubiquitous Computing (EUC '08)
, vol.2
, pp. 3-9
-
-
Peng, S.C.1
Jia, W.J.2
Wang, G.J.3
-
8
-
-
64049107478
-
E-hermes: A robust cooperative trust establishment scheme for mobile Ad Hoc networks
-
2-s2.0-64049107478 10.1016/j.adhoc.2008.10.003
-
Zouridaki C., Mark B. L., Hejmo M., Thomas R. K., E-hermes: a robust cooperative trust establishment scheme for mobile Ad Hoc networks. Ad Hoc Networks 2009 7 6 1156 1168 2-s2.0-64049107478 10.1016/j.adhoc.2008.10.003
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.6
, pp. 1156-1168
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
9
-
-
63049099708
-
Reliable and fully distributed trust model for mobile Ad Hoc networks
-
2-s2.0-63049099708 10.1016/j.cose.2008.11.009
-
Omar M., Challal Y., Bouabdallah A., Reliable and fully distributed trust model for mobile Ad Hoc networks. Computers and Security 2009 28 3-4 199 214 2-s2.0-63049099708 10.1016/j.cose.2008.11.009
-
(2009)
Computers and Security
, vol.28
, Issue.3-4
, pp. 199-214
-
-
Omar, M.1
Challal, Y.2
Bouabdallah, A.3
-
10
-
-
84863140208
-
A trust method of MANETs based on D-S evidence theory
-
Xie H., Ma J. F., Yang L., Dong X. W., A trust method of MANETs based on D-S evidence theory. International Journal of Advancements in Computing Technology 2012 4 2 247 257
-
(2012)
International Journal of Advancements in Computing Technology
, vol.4
, Issue.2
, pp. 247-257
-
-
Xie, H.1
Ma, J.F.2
Yang, L.3
Dong, X.W.4
-
11
-
-
76449102186
-
A trust model based on evidence theory for P2P systems
-
2-s2.0-76449102186
-
Huang L. D., Xue G., He X. L., Zhuang H. L., A trust model based on evidence theory for P2P systems. Applied Mechanics and Materials 2010 20 23 99 104 2-s2.0-76449102186
-
(2010)
Applied Mechanics and Materials
, vol.20
, Issue.23
, pp. 99-104
-
-
Huang, L.D.1
Xue, G.2
He, X.L.3
Zhuang, H.L.4
-
12
-
-
80255139291
-
A new evidential trust model for open distributed systems
-
Jiang L. M., Xu J., Zhang K., Zhang H., A new evidential trust model for open distributed systems. Expert Systems with Applications 2012 39 3 3772 3782
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.3
, pp. 3772-3782
-
-
Jiang, L.M.1
Xu, J.2
Zhang, K.3
Zhang, H.4
-
13
-
-
0000516376
-
Upper and lower probabilities induced by a multi-valued mapping
-
Dempster A. P., Upper and lower probabilities induced by a multi-valued mapping. The Annals of Mathematical Statistics 1967 38 2 325 339
-
(1967)
The Annals of Mathematical Statistics
, vol.38
, Issue.2
, pp. 325-339
-
-
Dempster, A.P.1
-
15
-
-
80051982332
-
Improved secure trust-based location-aided routing model for MANETs
-
Wang K., Wu M., Improved secure trust-based location-aided routing model for MANETs. China Communications 2011 8 3 154 162
-
(2011)
China Communications
, vol.8
, Issue.3
, pp. 154-162
-
-
Wang, K.1
Wu, M.2
-
16
-
-
78650394299
-
Trust-based on-demand multipath routing in mobile Ad Hoc networks
-
2-s2.0-78650394299 10.1049/iet-ifs.2009.0140
-
Li X., Jia Z. P., Zhang P., Wang H. Y., Trust-based on-demand multipath routing in mobile Ad Hoc networks. IET Information Security 2010 4 4 212 232 2-s2.0-78650394299 10.1049/iet-ifs.2009.0140
-
(2010)
IET Information Security
, vol.4
, Issue.4
, pp. 212-232
-
-
Li, X.1
Jia, Z.P.2
Zhang, P.3
Wang, H.Y.4
-
17
-
-
77950193796
-
Trusted routing based on dynamic trust mechanism in mobile Ad-Hoc networks
-
2-s2.0-77950193796 10.1587/transinf.E93.D.510 500
-
Peng S. C., Jia W. J., Wang G. J., Wu J., Guo M. Y., Trusted routing based on dynamic trust mechanism in mobile Ad-Hoc networks. IEICE Transactions on Information and Systems 2010 E93.D 3 510 517 2-s2.0-77950193796 10.1587/transinf.E93.D.510
-
(2010)
IEICE Transactions on Information and Systems
, vol.E93
, Issue.3
, pp. 510-517
-
-
Peng, S.C.1
Jia, W.J.2
Wang, G.J.3
Wu, J.4
Guo, M.Y.5
-
18
-
-
39049100803
-
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
-
DOI 10.1016/j.comcom.2007.10.021, PII S0140366407004276
-
Narula P., Dhurandher S. K., Misra S., Woungang I., Security in mobile Ad-Hoc networks using soft encryption and trust-based multi-path routing. Computer Communications 2008 31 4 760 769 2-s2.0-39049100803 10.1016/j.comcom.2007.10.021 (Pubitemid 351248943)
-
(2008)
Computer Communications
, vol.31
, Issue.4
, pp. 760-769
-
-
Narula, P.1
Dhurandher, S.K.2
Misra, S.3
Woungang, I.4
-
19
-
-
84856812343
-
Evaluating trust in Ad Hoc network routing by induction of decision trees
-
Sirotheau S. L. F., Sousa R. T. D., Evaluating trust in Ad Hoc network routing by induction of decision trees. IEEE Latin America Transactions 2012 10 1 1332 1343
-
(2012)
IEEE Latin America Transactions
, vol.10
, Issue.1
, pp. 1332-1343
-
-
Sirotheau, S.L.F.1
Sousa, R.T.D.2
-
20
-
-
33646410469
-
Performance comparison of trust-based reactive routing protocols
-
2-s2.0-33646410469 10.1109/TMC.2006.83
-
Pirzada A. A., McDonald C., Datta A., Performance comparison of trust-based reactive routing protocols. IEEE Transactions on Mobile Computing 2006 5 6 695 710 2-s2.0-33646410469 10.1109/TMC.2006.83
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.6
, pp. 695-710
-
-
Pirzada, A.A.1
McDonald, C.2
Datta, A.3
-
21
-
-
0010623928
-
A new distance between two bodies of evidence
-
DOI 10.1016/S1566-2535(01)00026-4, PII S1566253501000264
-
Jousselme A. L., Grenier D., Bosse E., A new distance between two bodies of evidence. Information Fusion 2001 2 2 91 101 2-s2.0-0010623928 10.1016/S1566-2535(01)00026-4 (Pubitemid 33632552)
-
(2001)
Information Fusion
, vol.2
, Issue.2
, pp. 91-101
-
-
Jousselme, A.-L.1
Grenier, D.2
Bosse, E.3
|