A reliable trust management scheme in wireless sensor networks

N Labraoui - … Symposium on Programming and Systems (ISPS), 2015 - ieeexplore.ieee.org
Physical security of wireless sensor nodes cannot be provided because making sensor
nodes tamperproof is prohibitively expensive. Due to this lack of physical security, intruders …

A service oriented adaptive trust evaluation model for ubiquitous computing environment

G Jagadamba, BS Babu - … Journal of Ad Hoc and Ubiquitous …, 2018 - inderscienceonline.com
The increased participation of various devices and networks, involvement of heterogeneous
system, and context-awareness raises a significance of trust and trust evaluation in the …

[PDF][PDF] An Intelligent Technique for Improving DataAccess Based on Merging Some of Protocols package using P2PDelayedNetworks

MM Al-Harthi, MT Faheem, AA Alahmadi - in International Journal of …, 2013 - Citeseer
This paper presents a new approach for analyzing and exploring the performance of a time
dynamical model with delays transmission among peer to peer's transactions based on an …

[PDF][PDF] Trust-based Testbed for P2P digital library

RS Alkhawaldeh, M Alawida, I AlHadid - Italian Journal of Pure and … - researchgate.net
Retrieving relevant information from trust-based Peer-to-Peer (P2P) net-works is a
challenging research task. The users on P2P networks endeavor to ensure that the peers …

MSc in Advanced Computer Science and IT Management in the Faculty of Engineering and Physical Sciences

AA ADEWUYI - studentnet.cs.manchester.ac.uk
“FRIENDS”: A TRUST-BASED MEMBERSHIP SELECTION ALGORITHM FOR COLLABORATIVE
DOWNLOADING A dissertation submitted to The Univer Page 1 “FRIENDS”: A TRUST-BASED …

[引用][C] A survey of trust management in mobile ad-hoc networks

P England, Q Shi, B Askwith, F Bouhafs - Proceedings of the 13th annual post …, 2012