-
1
-
-
36949013183
-
DRBTS: Distributed reputation-based Beacon trust system
-
Autonomic and Secure Computing (DASC’06), Indianapolis, USA
-
A. Srinivasan, J. Teitelbaum, and J.Wu, DRBTS: Distributed reputation-based Beacon trust system, in Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC’06), Indianapolis, USA, pp. 277-283, 2006.
-
(2006)
Proceedings of the 2nd IEEE International Symposium on Dependable
, pp. 277-283
-
-
Srinivasan, A.1
Teitelbaum, J.2
Wu, J.3
-
2
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
NewYork, USA, October
-
S. Ganeriwal and M. Srivastava, Reputation-based framework for high integrity sensor networks, in Proceedings of the 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks (SASN '04), NewYork, USA, October 2004, pp. 66-77.
-
(2004)
Proceedings of the 2nd ACMWorkshop on Security of Ad Hoc and Sensor Networks (SASN '04)
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.2
-
3
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Y. Hu and A. Perrig, A survey of secure wireless ad hoc routing, IEEE Security and Privacy, 2(3), 28-39, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.1
Perrig, A.2
-
5
-
-
0033903726
-
Supporting trust in virtual communities
-
Maui, Hawaii
-
A. Abdul-Rahman and S. Hailes, Supporting trust in virtual communities, in Proceedings of the 33rd Hawaii International Conference on System Sciences, Maui, Hawaii, Vol. 6, p. 6007, 2000.
-
(2000)
Proceedings of the 33rd Hawaii International Conference on System Sciences
, vol.6
, pp. 6007
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
6
-
-
33745913622
-
B-trust: Bayesian trust framework for pervasive computing
-
Pisa, Italy
-
D. Quercia, S. Hailes, and L. Capra, B-trust: Bayesian trust framework for pervasive computing, in Proceedings of the 4th International Conference on TrustManagement, Pisa, Italy, Vol. 3986, pp. 298-312, 2006.
-
(2006)
Proceedings of the 4th International Conference on TrustManagement
, vol.3986
, pp. 298-312
-
-
Quercia, D.1
Hailes, S.2
Capra, L.3
-
7
-
-
24944522572
-
Towards a generic trust model-comparison of various trust update algorithms
-
Rocquencourt, France
-
M. Kinateder, E. Baschny, and K. Rothermel, Towards a generic trust model-comparison of various trust update algorithms, in Proceedings of the 3rd International Conference on Trust Management, Rocquencourt, France, Vol. 3477, pp. 177-192, 2005.
-
(2005)
Proceedings of the 3rd International Conference on Trust Management
, vol.3477
, pp. 177-192
-
-
Kinateder, M.1
Baschny, E.2
Rothermel, K.3
-
8
-
-
5044222209
-
A dynamic trust model for mobile ad hoc networks
-
Suzhou, China
-
Z. Liu, A.W. Joy, and R.A. Thompson, A dynamic trust model for mobile ad hoc networks, in 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, Suzhou, China, pp. 80-85, 2004.
-
(2004)
10th IEEE International Workshop on Future Trends of Distributed Computing Systems
, pp. 80-85
-
-
Liu, Z.1
Joy, A.W.2
Thompson, R.A.3
-
9
-
-
85113133621
-
CORE: A COllaborative REputation mechanism to enforce node cooperation inMobile AdHocNetworks
-
Portoroz, Slovenia, September
-
P. Michiardi and R. Molva, CORE: A COllaborative REputation mechanism to enforce node cooperation inMobile AdHocNetworks, in Proceedings of the 6th IFIP Communication andMultimedia Security Conference, Portoroz, Slovenia, Vol. 228, pp. 107-121, September 2002.
-
(2002)
Proceedings of the 6th IFIP Communication andMultimedia Security Conference
, vol.228
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
10
-
-
0036061630
-
Evolving and managing trust in grid computing systems
-
Winnipeg, Canada
-
F.Azzedin and M.Maheswaran, Evolving and managing trust in grid computing systems, in Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE’02), Winnipeg, Canada, Vol. 3, pp. 1424-1429, 2002.
-
(2002)
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering (CCECE’02)
, vol.3
, pp. 1424-1429
-
-
Azzedin, F.1
Maheswaran, M.2
-
11
-
-
33745900048
-
A robust reputation system for peer-to-peer and mobile ad hoc networks
-
Harvard University, Cambridge, MA, USA, June
-
S. Buchegger and J.-Y. Le Boudec, A robust reputation system for peer-to-peer and mobile ad hoc networks, in Proceedings of P2Pecon 2004, Harvard University, Cambridge, MA, USA, June 2004.
-
(2004)
Proceedings of P2Pecon 2004
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
12
-
-
0003839495
-
-
Ph.D. Thesis, Department of Computer Science and Mathematics, University of Stirling
-
S. Marsh, Formulating trust as a computational concept, Ph.D. Thesis, Department of Computer Science and Mathematics, University of Stirling, 1994.
-
(1994)
Formulating trust as a computational concept
-
-
Marsh, S.1
-
13
-
-
80054939702
-
-
Ph.D. Thesis, Faculty of Engineering, University of Technology, Sydney, Australia, July
-
M. Momani, Bayesian methods for modeling and management of trust in wireless sensor networks, Ph.D. Thesis, Faculty of Engineering, University of Technology, Sydney, Australia, July, 2008.
-
(2008)
Bayesian methods for modeling and management of trust in wireless sensor networks
-
-
Momani, M.1
-
14
-
-
0141862713
-
-
Technical Report, MIS Research Center, Carlson School of Management, University of Minnesota
-
D.H. McKnight and N.L. Chervany, The Meanings of Trust, Technical Report, MIS Research Center, Carlson School of Management, University of Minnesota, 1996.
-
(1996)
The Meanings of Trust
-
-
McKnight, D.H.1
Chervany, N.L.2
-
15
-
-
85113133621
-
Simulation-based analysis of security exposures in mobile ad hoc networks
-
Florence, Italy
-
P. Michiardi and R. Molva, Simulation-based analysis of security exposures in mobile ad hoc networks, in Proceedings of the EuropeanWireless Conference, Florence, Italy, pp. 107-121, 2002.
-
(2002)
Proceedings of the EuropeanWireless Conference
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
16
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, Alaska, USA, May
-
C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, in Proceedings of the 1st IEEE International Workshop on Sensor Networks Protocols and Applications, Anchorage, Alaska, USA, pp. 113-127, May 2003.
-
(2003)
Proceedings of the 1st IEEE International Workshop on Sensor Networks Protocols and Applications
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
17
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks)
-
Lausanne, Switzerland, June
-
S. Buchegger and J-Y.L. Boudec, Performance analysis of the CONFIDANT protocol (Cooperation Of Nodes-Fairness In Dynamic Ad-hoc NeTworks), in Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02), Lausanne, Switzerland, pp. 226-236, June 2002.
-
(2002)
Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02)
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
18
-
-
0004078695
-
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, The keynote trust management system version 2, Internet RFC 2704, 1999.
-
(1999)
The keynote trust management system version 2, Internet RFC 2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
19
-
-
84948440714
-
Design of a role-based trust management framework
-
Oakland
-
N. Li, J. Mitchell, and W. Winsborough, Design of a role-based trust management framework, in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, p. 114, 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 114
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
20
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols
-
West Point, June
-
P.Ning and K. Sun, How to misuse AODV: A case study of insider attacks against mobile ad hoc routing protocols, in Proceedings of the 4th Annual IEEE Information AssuranceWorkshop, West Point, pp. 60-67, June 2003.
-
(2003)
Proceedings of the 4th Annual IEEE Information AssuranceWorkshop
, pp. 60-67
-
-
Ning, P.1
Sun, K.2
-
21
-
-
10644256718
-
Estimating the value of co-operation approaches for multi-hop ad hoc networks
-
B. Lamparter, M. Plaggemeier, and D. Westhoff, Estimating the value of co-operation approaches for multi-hop ad hoc networks, Ad Hoc Networks, 3 (1), 17-16, 2005.
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.1
, pp. 16-17
-
-
Lamparter, B.1
Plaggemeier, M.2
Westhoff, D.3
-
22
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
ACM Press, New York, USA
-
Y. Zhang andW. Lee, Intrusion detection in wireless ad hoc networks, in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), pp. 275-283, ACM Press, New York, USA, 2000.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000)
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
23
-
-
0002101577
-
Reputation system
-
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, Reputation system, Communications of the ACM, 43(12), 45-48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
24
-
-
84871044906
-
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
-
Minneapolis, Minnesota, USA
-
C.Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. in Proceedings of the ACM Conference on Electronic Commerce, Minneapolis, Minnesota, USA, pp. 150-157, 2000.
-
(2000)
Proceedings of the ACM Conference on Electronic Commerce
, pp. 150-157
-
-
Dellarocas, C.1
-
25
-
-
34547637688
-
Trust among strangers in Internet transactions: Empirical analysis of eBays’s reputation system
-
Elsevier Science, Amsterdam, Netherlands
-
P. Resnick and R. Zeckhauser, Trust among strangers in Internet transactions: Empirical analysis of eBays’s reputation system, Advances in Applied Microeconomics, Vol. 11, pp. 127-157, Elsevier Science, Amsterdam, Netherlands, 2002.
-
(2002)
Advances in Applied Microeconomics
, vol.11
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
26
-
-
0035747559
-
Managing trust in a peer-2-peer information system
-
Atlanta, Georgia
-
K. Aberer and Z. Despotovic, Managing trust in a peer-2-peer information system, in Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM 2001), Atlanta, Georgia, pp. 310-317, 2001.
-
(2001)
Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM 2001)
, pp. 310-317
-
-
Aberer, K.1
Despotovic, Z.2
-
27
-
-
4944220325
-
The beta reputaion system
-
Bled, Slovenia, June
-
A. Josang and R. Ismail, The beta reputaion system, in Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, pp. 324-327, June 2002.
-
(2002)
Proceedings of the 15th Bled Electronic Commerce Conference
, pp. 324-327
-
-
Josang, A.1
Ismail, R.2
-
28
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, Massachusetts, USA
-
S.Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000), Boston, Massachusetts, USA, pp. 255-265, 2000.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom 2000)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
29
-
-
11244250305
-
The effect of rumor spreading in reputation systems in mobile ad hoc networks
-
Sofia- Antipolis, March
-
S. Buchegger and J.-Y. Le Boudec, The effect of rumor spreading in reputation systems in mobile ad hoc networks, in Proceedings ofWiopt’ 03, Sofia- Antipolis, March 2003.
-
(2003)
Proceedings ofWiopt’ 03
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
30
-
-
85138391645
-
-
University of Rhode Island, October
-
Y.L. Sun, W. Yu, Z.Han, and K.J. Ray Li, Trust modeling and evaluation for ad hoc networks, Technical Report No: 20041017-21, University of Rhode Island, October 2004.
-
(2004)
Trust modeling and evaluation for ad hoc networks, Technical Report No: 20041017-21
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Ray Li, K.J.4
-
31
-
-
77952524927
-
Reputation and trust-based systems for ad hoc and sensor networks, A. Boukerche, ed
-
Wiley and Sons
-
A. Srinivasan, J.Teitelbaum, H. Liang, J.Wu, and M. Cardei, Reputation and trust-based systems for ad hoc and sensor networks, A. Boukerche, ed., in Algorithms and Protocols forWireless Ad Hoc and Sensor Networks, Wiley and Sons, 2008.
-
(2008)
Algorithms and Protocols forWireless Ad Hoc and Sensor Networks
-
-
Srinivasan, A.1
Teitelbaum, J.2
Liang, H.3
Wu, J.4
Cardei, M.5
-
33
-
-
21644475636
-
“Context aware inferencing to rate a selfish node in DSR-based ad hoc networks
-
Taipeh, Taiwan
-
K. Paul and D. Westhoff, “Context aware inferencing to rate a selfish node in DSR-based ad hoc networks, in Proceedings of the IEEE Globecom Conference, Taipeh, Taiwan, 2002.
-
(2002)
Proceedings of the IEEE Globecom Conference
-
-
Paul, K.1
Westhoff, D.2
-
35
-
-
0347608169
-
A logic for uncertain probabilities
-
June
-
A. Josang, A logic for uncertain probabilities, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3), 279-311, June 2001.
-
(2001)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Josang, A.1
-
36
-
-
84900044615
-
The production of trust in online markets
-
E.J. Lawler, M. Macy, S. Thyne, H.A. Walker, eds, JAI Press, Greenwich, CT
-
P. Kollock, The production of trust in online markets, E.J. Lawler, M. Macy, S. Thyne, H.A. Walker, eds, Advances in Group Processes, Vol. 16, JAI Press, Greenwich, CT, 1999.
-
(1999)
Advances in Group Processes
, vol.16
-
-
Kollock, P.1
-
37
-
-
1642324009
-
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses
-
San Diego, California, USA, February
-
G. Montenegro and C. Castelluccia, Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses, in Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS’02), San Diego, California, USA, February 2002.
-
(2002)
Proceedings of the 9th Annual Network and Distributed System Security Symposium (NDSS’02)
-
-
Montenegro, G.1
Castelluccia, C.2
-
38
-
-
84947273682
-
The Sybil attack
-
Cambridge, MA, USA, March
-
J. R. Douceur, The Sybil attack, in Proceedings of the 1st InternationalWorkshop on Peer-to-Peer Systems, Cambridge, MA, USA, pp. 251-260, March 2002.
-
(2002)
Proceedings of the 1st InternationalWorkshop on Peer-to-Peer Systems
, pp. 251-260
-
-
Douceur, J.R.1
-
39
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis and defenses
-
Berkeley, California, USA, April
-
J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil attack in sensor networks: Analysis and defenses, in Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, California, USA, April 2004.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
41
-
-
4344576243
-
Establishing trust in pure ad hoc networks
-
Dunedin, New Zealand
-
A. Pirzada and C. McDonald, Establishing trust in pure ad hoc networks, in Proceedings of the 27th Australian Conference on Computer Science, Dunedin, New Zealand, 2004, pp. 47-54.
-
(2004)
Proceedings of the 27th Australian Conference on Computer Science
, pp. 47-54
-
-
Pirzada, A.1
McDonald, C.2
-
42
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Y.L. Sun, W. Yu, Z. Han, and K.J.R. Liu, Information theoretic framework of trust modeling and evaluation for ad hoc networks, IEEE Journal on Selected Areas in Communication, 24, 305-317, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communication
, vol.24
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
43
-
-
36148993172
-
Enforcing cooperative resource sharing in untrusted peer-to-peer environment
-
10(6)
-
Z. Liang and W. Shi, Enforcing cooperative resource sharing in untrusted peer-to-peer environment, ACM Journal of Mobile Networks and Applications (MONET), 10(6), pp. 771-783, 2005.
-
(2005)
ACM Journal of Mobile Networks and Applications (MONET)
, pp. 771-783
-
-
Liang, Z.1
Shi, W.2
-
44
-
-
29844440372
-
-
Technical Report MIST-TR-2005-002, Department of Computer Science, Wayne State University, February
-
Z. Liang andW. Shi, Analysis of ratings on trust inference in the open environment, Technical Report MIST-TR-2005-002, Department of Computer Science, Wayne State University, February 2005.
-
(2005)
Analysis of ratings on trust inference in the open environment
-
-
Liang, Z.1
Shi, W.2
-
45
-
-
33744991057
-
Trust evaluation based security solution in ad hoc networks
-
Trondheim, Norway
-
Z. Yan, P. Zhang, and T. Virtanen, Trust evaluation based security solution in ad hoc networks, in Proceedings of the 7th NordicWorkshop on Secure IT Systems, Trondheim, Norway, pp. 37-50, 2003.
-
(2003)
Proceedings of the 7th NordicWorkshop on Secure IT Systems
, pp. 37-50
-
-
Yan, Z.1
Zhang, P.2
Virtanen, T.3
-
46
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
August
-
K. Ren, T. Li, Z. Wan, F. Bao, R.H. Deng, and K. Kim, Highly reliable trust establishment scheme in ad hoc networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 45, 687-699, August 2004.
-
(2004)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.45
, pp. 687-699
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
48
-
-
17144420084
-
Computing of trust in wireless networks
-
Los Angeles, CA, September
-
H. Zhu, F. Bao, and R.H. Deng, Computing of trust in wireless networks, in Proceedings of the 60th IEEE Vehicular Technology Conference, Los Angeles, CA, Vol. 4, pp. 2621-2624, September 2004.
-
(2004)
Proceedings of the 60th IEEE Vehicular Technology Conference
, vol.4
, pp. 2621-2624
-
-
Zhu, H.1
Bao, F.2
Deng, R.H.3
-
50
-
-
33751080745
-
Trusted computing for protecting ad hoc routing
-
Moncton, New Brunswick
-
M. Jarrett and P. Ward, Trusted computing for protecting ad hoc routing, in Proceedings of the 4th IEEE Annual Communication Networks and Services Research Conference (CNSR’06), Moncton, New Brunswick, pp. 61-68, 2006.
-
(2006)
Proceedings of the 4th IEEE Annual Communication Networks and Services Research Conference (CNSR’06)
, pp. 61-68
-
-
Jarrett, M.1
Ward, P.2
-
52
-
-
67049097590
-
Markov chain-based trust model for analyzing trust value in distributed multicasting mobile ad hoc networks
-
Yilan, Taiwan, December
-
B.-J. Chang, S.-L. Kuo, Y.-H. Liang, and D.-Y. Wang, Markov chain-based trust model for analyzing trust value in distributed multicasting mobile ad hoc networks, in Proceedings of the IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, December, 2008, pp. 156-161.
-
(2008)
Proceedings of the IEEE Asia-Pacific Services Computing Conference
, pp. 156-161
-
-
Chang, B.-J.1
Kuo, S.-L.2
Liang, Y.-H.3
Wang, D.-Y.4
|