Sciweavers

671 search results - page 105 / 135
» Trust evaluation in ad-hoc networks
Sort
View
IDTRUST
2009
ACM
14 years 5 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
COMPSAC
2006
IEEE
14 years 5 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
IPCCC
2007
IEEE
14 years 5 months ago
Streaming in MANET: Proactive Link Protection and Receiver-Oriented Adaptation
Multimedia streaming applications can significantly boost the value of mobile ad hoc networks (MANET). Live streaming, however, means continuous data delivery, which is a major c...
Toby Xu, Ymg Cai
LADC
2007
Springer
14 years 5 months ago
Gossiping: Adaptive and Reliable Broadcasting in MANETs
Given the frequent topology changes in Mobile Ad Hoc Networks (MANET), the choice of appropriate broadcasting techniques is crucial to ensure reliable delivery of messages. The spr...
Abdelmajid Khelil, Neeraj Suri