-
1
-
-
79951788748
-
A distributed trust model for securing mobile Ad hoc networks
-
11-13 Dec
-
P. Chatterjee, I. Sengupta, and S. K. Ghosh, A Distributed Trust Model for Securing Mobile Ad Hoc Networks, IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, Hongkong, 11-13 Dec, 2010, pp. 818-825.
-
(2010)
IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, Hongkong
, pp. 818-825
-
-
Chatterjee, P.1
Sengupta, I.2
Ghosh, S.K.3
-
2
-
-
0001951820
-
Can we trust
-
Gambetta, Diego (ed. ) University of Oxford, chapter 13
-
G. Diego, Can We Trust , in Gambetta, Diego (ed. ) Trust Making and Breaking Cooperative Relations, Electronic edition, Department of Sociology, University of Oxford, chapter 13, 2000, pp. 213-237.
-
(2000)
Trust Making and Breaking Cooperative Relations, Electronic Edition, Department of Sociology
, pp. 213-237
-
-
Diego, G.1
-
3
-
-
84877998022
-
A credible routing based on a novel trust mechanism in ad hoc networks
-
R. Feng, S. Che, X. Wang, and N. Yu, " A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks" In International Journal of Distributed Sensor Networks, vol. 2013, Article ID 652051, 2013, 12 pages.
-
(2013)
International Journal of Distributed Sensor Networks 2013
-
-
Feng, R.1
Che, S.2
Wang, X.3
Yu, N.4
-
4
-
-
84893749694
-
A novel encounterbased metric for mobile ad-hoc networks routing
-
March
-
T. T. Son, H. L. Minh, G. Sexton and N. Aslam, A novel encounterbased metric for mobile ad-hoc networks routing, International Journal of Ad Hoc Networks, vol. 14, pp. 2-14. March 2014.
-
(2014)
International Journal of Ad Hoc Networks
, vol.14
, pp. 2-14
-
-
Son, T.T.1
Minh, H.L.2
Sexton, G.3
Aslam, N.4
-
5
-
-
35148838653
-
Secure routing protocol based trust for Ad hoc networks
-
July 30th-Aug 1st
-
Z. Liu, S. Lu, J. Yan, " Secure Routing Protocol based Trust for Ad Hoc Networks ", IEEE Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, July 30th-Aug 1st, 2007, pp. 279-283.
-
(2007)
IEEE Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
, pp. 279-283
-
-
Liu, Z.1
Lu, S.2
Yan, J.3
-
6
-
-
77950193796
-
Trusted routing based on dynamic trust mechanism in mobile Ad-Hoc networks
-
S. C. Peng, W. J. Jia, G. J. Wang, J. Wu and M. Y. Guo, Trusted routing based on dynamic trust mechanism in mobile Ad-Hoc networks, IEICE Transactions on Information and Systems, vol. E93. D, no. 3, 2010, pp. 510517.
-
(2010)
IEICE Transactions on Information and Systems E93. D
, vol.3
, pp. 510517
-
-
Peng, S.C.1
Jia, W.J.2
Wang, G.J.3
Wu, J.4
Guo, M.Y.5
-
7
-
-
43449107967
-
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
-
June
-
I. Raza, S. A. Hussain, Identification of malicious nodes in an AODV pure ad hoc network through guard nodes, Journal of Computer Communications, vol. 31, Issue 9, pp. 1796-1802, June 2008.
-
(2008)
Journal of Computer Communications
, vol.31
, Issue.9
, pp. 1796-1802
-
-
Raza, I.1
Hussain, S.A.2
-
8
-
-
84929410413
-
A better approach towards securing mobile ad hoc network
-
April
-
A. Chauhan, A. Patle and A. Mahajan , "A Better Approach towards Securing Mobile Ad Hoc Network", International Journal of Computer Applications (0975 8887), vol. 20, no. 8, pp. 6-11, April, 2011.
-
(2011)
International Journal of Computer Applications (0975 8887)
, vol.20
, Issue.8
, pp. 6-11
-
-
Chauhan, A.1
Patle, A.2
Mahajan, A.3
-
9
-
-
78650384583
-
A node-Based trust management scheme for mobile Ad hoc network
-
Sept 1st Sept 3rd
-
R. Ferdous, V. Muthukkumarasamy and A. Sattar, "A Node-based Trust Management Scheme for Mobile Ad Hoc Network", IEEE Fourth International Conference on Network and System Security, Melbourne, Sept 1st Sept 3rd, 2010, pp. 275-280.
-
(2010)
IEEE Fourth International Conference on Network and System Security, Melbourne
, pp. 275-280
-
-
Ferdous, R.1
Muthukkumarasamy, V.2
Sattar, A.3
-
10
-
-
21144452079
-
Collaborative trust-based secure routing in multihop ad hoc networks
-
Networking 2004 Ed. Greece Springer Berlin Heidelberg
-
N. Pissinou, T. Ghosh, and K. Makki, Collaborative trust-based secure routing in multihop ad hoc networks, in Networking 2004, Lecture notes in Computer Science, vol. 3042, Ed. Greece, Springer Berlin Heidelberg, 2004, pp. 1446-1451.
-
(2004)
Lecture Notes in Computer Science
, vol.3042
, pp. 1446-1451
-
-
Pissinou, N.1
Ghosh, T.2
Makki, K.3
-
11
-
-
11244296240
-
A trust model based routing protocol for secure Ad hoc networks
-
March 6th March 13th
-
X. Li, M. R Lyu and J. Liu, "A Trust Model Based Routing Protocol for Secure Ad Hoc Networks", In the Proceedings of IEEE Aerospace Conference (IEEEAC), March 6th March 13th, 2004, pp. 1286-1295.
-
(2004)
The Proceedings of IEEE Aerospace Conference (IEEEAC)
, pp. 1286-1295
-
-
Li, X.1
Lyu, M.R.2
Liu, J.3
-
12
-
-
84860804005
-
A mobility factor based path selection scheme for Mobile Ad-hoc Networks
-
Feb 3rd Feb 5th
-
S. Sarkar and R. Datta, A mobility factor based path selection scheme for Mobile Ad-hoc Networks, National Conference on Communications (NCC), Kharagpur, Feb 3rd Feb 5th, 2012, pp. 1-5.
-
(2012)
National Conference on Communications (NCC), Kharagpur
, pp. 1-5
-
-
Sarkar, S.1
Datta, R.2
-
13
-
-
84864436314
-
A generalization of Bayesian inference
-
R. R. Yager L. Liu (Eds. ) Springer Verlag, Berlin, Germany
-
A. P. Dempster, A generalization of Bayesian inference, in: R. R. Yager, L. Liu (Eds. ), Classic Works of the DempsterShafer Theory of Belief Functions, Springer-Verlag, Berlin, Germany, 2008, pp. 73104.
-
(2008)
Classic Works of the DempsterShafer Theory of Belief Functions
, pp. 73104
-
-
Dempster, A.P.1
|