Sciweavers

334 search results - page 6 / 67
» Survey of trust models in different network domains
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 9 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
GLOBECOM
2010
IEEE
13 years 5 months ago
Trust Management for Encounter-Based Routing in Delay Tolerant Networks
: We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate trust evaluation...
Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee ...
TCAD
2008
181views more  TCAD 2008»
13 years 7 months ago
A Survey of Automated Techniques for Formal Software Verification
The quality and the correctness of software is often the greatest concern in electronic systems. Formal verification tools can provide a guarantee that a design is free of specific...
Vijay D'Silva, Daniel Kroening, Georg Weissenbache...
EDBT
2008
ACM
149views Database» more  EDBT 2008»
14 years 7 months ago
A probabilistic trust model for semantic peer to peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
ADHOC
2005
165views more  ADHOC 2005»
13 years 7 months ago
A survey on routing protocols for wireless sensor networks
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of ...
Kemal Akkaya, Mohamed F. Younis