Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899281
DOI10.1007/11734727zbMATH Open1185.94079OpenAlexW2493058093MaRDI QIDQ5899281FDOQ5899281
Authors: Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11734727
Recommendations
Cited In (14)
- L-RTAM: logarithm based reliable trust assessment model for WBSNs
- Security and trust in sensor networks
- Reliability of wireless sensors with code attestation for intrusion detection
- An extended hierarchical trusted model for wireless sensor networks
- Insider attacks against multi-factor authentication protocols for wireless sensor networks
- Trust models in wireless sensor networks: A survey
- Sec-TMP: A secure topology maintenance protocol for event delivery enforcement in WSN
- TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks
- Security and trust for wireless autonomic networks. Systems and control methods
- Trustworthiness of single hop link in wireless sensor network
- Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
- A bio inspired and trust based approach for clustering in WSN
- Foreword: Defending against wireless network intrusion
- Management and applications of trust in wireless sensor networks: a survey
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899281)