Author:
Zhan Guoxing,Shi Weisong,Deng Julia
Subject
Software,Computer Science Applications,Hardware and Architecture,Computer Networks and Communications,Information Systems
Reference33 articles.
1. Security considerations in ad hoc sensor networks;Hu;Ad Hoc Networks,2005
2. M. Blaze, J. Feigenbaum, J. Lacy, Decentralized trust management, in: Proceedings of 1996 IEEE Symposium on Security and Privacy, 1996, pp. 164–173.
3. A. Boukerche, K. El-Khatib, L. Xu, L. Korba, A novel solution for achieving anonymity in wireless ad hoc networks, in: Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks, 2004, pp. 30–38.
4. Z. Liu, A. Joy, R. Thompson, A dynamic trust model for mobile ad hoc networks, in: Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004, pp. 80–85.
5. Q. He, D. Wu, P. Khosla, Sori: a secure and objective reputation-based incentive scheme for ad hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference, 2004, pp. 825–830.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献