[1]
|
C. Karlof and D. Wanger, “Secure Routing in Wireless Sensor Networks: Attacks and Counter-Measures,” First IEEE International Workshop on Sensor Network Protocols and Applications, IEEE Computer Society, Anchorage, May 2003, pp. 113-127.
|
[2]
|
D. Liu and P. Ning, “Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks,” Technical Report: North Carolina State University at Raleigh, September 2002.
|
[3]
|
M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized Trust Management,” Proceedings of the 17th Symposium on Security and Privacy, 1996.
|
[4]
|
M. Blaze, J. Feigenbaum and J. Ioannidis, “The KeyNote Trust Management System,” Version 2, Internet Engineering Task Force, September 1999.
|
[5]
|
N. H. Li, J. C. Mitchell, W. H. Winsborough, “Design of a Role-Based Trust Management Framework,” In Header, H. Ed., Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Washington, 2002, pp. 114-130.
|
[6]
|
P. Resnick and R. Zeckhauser, “Trust among Strangers in Internet Transactions: Empirical Analysis of eBya’s Reputation System,” National Bureau of Economic Research Workshop on Empirical Studies of Electronic Commerce, 2000.
|
[7]
|
S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol,” Proceedings of ACM Mobihoc, 2002.
|
[8]
|
L. Xiong and L. Liu, “A reputation-Based Trust Model for Peer to Peer Ecommerce Communities,” IEEE Conference on E-Commerce, 2003.
|
[9]
|
J. Deng, R. Han and S. Mishra, “INSENS: Intrusion- Tolerant Routing in Wireless Sensor Networks,” Department of Computer Science Technical Report CU-CS- 939-02, University of Colorado, Boulder, 2006.
|