Author:
Yimin Guo,Yajun Guo,Fei Peng,Huidan Gao
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Narula, P., Dhurandher, S.K., Misra, S., et al.: Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Computer Communications 31(4), 760–769 (2008)
2. Stajano, F.: The resurrecting duckling – what next? In: Proceedings of the 8th International Workshop on Security Protocols, pp. 204–214. Springler, Berlin (2000)
3. Blaze, M., Kannan, S., Lee, I., et al.: Dynamic trust management. Computer 42(2), 44–52 (2009)
4. Bandhakavi, S., Winsborough, W., Winslett, M.: A trust management approach for flexible policy management in security-typed languages. In: Proceedings of the 21st IEEE Computer Securituy Foundation Conference, pp. 33–47 (2008)
5. Hess, A., Holt, J., Jacobson, J., et al.: Content-triggered trust negotiation. ACM Transactions on Information and System Security 7(3), 428–456 (2004)