Trust threshold based public key management in mobile ad hoc networks
- 1 July 2016
- journal article
- Published by Elsevier BV in Ad Hoc Networks
- Vol. 44, 58-75
- https://doi.org/10.1016/j.adhoc.2016.02.014
Abstract
No abstract availableKeywords
Funding Information
- U.S. Department of Defense (DoD)
- U.S. Army Aeromedical Research Laboratory (DoD)
- Army Research Laboratory (DoD)
- Astrophysics Science Division (DoD)
This publication has 17 references indexed in Scilit:
- Secure and reliable routing protocols for heterogeneous multihop wireless networksIEEE Transactions on Parallel and Distributed Systems, 2013
- Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure RoutingIEEE Transactions on Parallel and Distributed Systems, 2013
- Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networksJournal of Network and Computer Applications, 2011
- A Survey on Trust Management for Mobile Ad Hoc NetworksIEEE Communications Surveys & Tutorials, 2010
- A robust self‐organized public key management for mobile ad hoc networksSecurity and Communication Networks, 2009
- Identity-based key management in mobile ad hoc networks: techniques and applicationsIEEE Wireless Communications, 2008
- Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETsIEEE Transactions on Vehicular Technology, 2008
- Self-organized public-key management for mobile ad hoc networksIEEE Transactions on Mobile Computing, 2003
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- How to share a secretCommunications of the ACM, 1979