Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899281
Recommendations
Cited in
(14)- L-RTAM: logarithm based reliable trust assessment model for WBSNs
- Security and trust in sensor networks
- Reliability of wireless sensors with code attestation for intrusion detection
- An extended hierarchical trusted model for wireless sensor networks
- Insider attacks against multi-factor authentication protocols for wireless sensor networks
- Trust models in wireless sensor networks: A survey
- Sec-TMP: A secure topology maintenance protocol for event delivery enforcement in WSN
- TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks
- Security and trust for wireless autonomic networks. Systems and control methods
- Trustworthiness of single hop link in wireless sensor network
- Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
- A bio inspired and trust based approach for clustering in WSN
- Foreword: Defending against wireless network intrusion
- Management and applications of trust in wireless sensor networks: a survey
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899281)