Author:
Wu Guowei,Du Zhuang,Hu Yibo,Jung Taeyoung,Fiore Ugo,Yim Kangbin
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference38 articles.
1. Alcaraza C, Lopeza J, Romanb R, Chenc H-H (2012) Selecting key management schemes for wsn applications. Comput Secur 31(8):956–966
2. Avinash S, Joshua T, Jie W (2006) Drbts: distributed reputation-based beacon trust system. In: Proceeding of the second IEEE international symposium on dependable, autonomic and secure computing. IEEE Press, New York, pp 277–283
3. Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (January 1999) The role of trust management in distributed systems security. Secure Internet Program 1603(1):185–210
4. Carullo G, Castiglione A, Cattaneo G, De Santis A, Fiore U, Palmieri F (2013) Feeltrust: providing trustworthy communications in ubiquitous mobile environment. In: Proceeding of the 27th IEEE international conference on advanced information networking and applications, AINA 2013, Barcelona, Spain, March 25–28, 2013, pp 1113–1120
5. Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) Trm-iot: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inform Syst 8(4):1207–1228
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献