Computing of Trust in Wireless Networks
The concept of small world in the context of wireless networks, first studied by A. Helmy (see IEEE Commun. Lett., vol.7, no.10, 2003), enables a path-finder to find paths from a source node to a designated target node in efficiently wireless networks. Based on this observation, we provide a practic...
Saved in:
Main Authors: | ZHU, Huafei, BAO, Feng, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2004
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/533 https://doi.org/10.1109/VETECF.2004.1400531 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Better Security Enforcement in Trusted Computing Enabled Heterogeneous Wireless Sensor Networks
by: YANG, Yanjiang, et al.
Published: (2009) -
Achieving better privacy protection in wireless sensor networks using trusted computing
by: YANG, Yanjiang, et al.
Published: (2009) -
Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks
by: YANG, Yanjiang, et al.
Published: (2008) -
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers
by: YANG, Yanjiang, et al.
Published: (2007) -
Securing Return Routability Protocol against Active Attacks
by: ZHU, Huafei, et al.
Published: (2004)