what-when-how
In Depth Tutorials and Information
28. Mitra, A. and Maheswaran, M. Benefits of targeting in trusted gossiping for peer-to-
peer information sharing. In IPDPS , May 2007.
29. Fengming Liu and Yongsheng Ding. Dynamics analysis of trust computing evolution
in P2P networks. Signal-Image Technologies and Internet-Based System , 2007. hird
InternationalIEEEConferenceonSITIS'07 . December 16-18, 2007, pp. 200-205.
30. Sun, Y. L., Yu, W., Han, Z., K.J., and Liu, R. Information theoretic framework of
trust modeling and evaluation for ad hoc networks. IEEEJournalonSelectedAreasin
Communications , 24 (2): 305-317, 2006.
31. Pai, S., Roosta, T., Wicker, S., and Sastry, S. Using social network theory towards
development of wireless ad hoc network trust. AdvancedInformationNetworkingand
ApplicationsWorkshops , 2007, 21stInternationalConferenceonAINAW'07 . Volume 1,
May 21-23, 2007, pp. 443-450.
32. S. Buchegger. Coping with misbehavior in mobile ad-hoc networks. hesis,
February 2004.
Search WWH ::




Custom Search