International audienceIn an ad hoc network, trust systems usually rely on both local and remote evidence in order to build a trust relationship. Remote evidences are usually gathered and concatenated with each other so as to collaboratively infer a trust relation. However, the ever-changing topology and the high versatility of wireless links (coming from e.g., presence of interferences and noise) imply that evidence is partial. Hence the resulting trust relation varies from time to time, depending on e.g., the connectivity. To tackle this issue, we exploit the notion of confidence interval that corresponds to an interval estimate of a parameter (e.g., mean, standard deviation) that characterizes the evidence population. We herein consider t...
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The...
In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the o...
Wireless ad hoc networks are resource constraint and vulnerable to various security attacks. Trust b...
International audienceIn an ad hoc network, trust systems usually rely on both local and remote evid...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
With the present need for on the move networking, innovative technologies strive to establish a tech...
An important concept in network security is trust, interpreted as a relation among entities that par...
Evaluation of trustworthiness of participating entities is an effective method to stimulate collabor...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
Abstract — Security issues and concerns for mobile ad-hoc networks have not yet been satisfactorily ...
Mobile ad hoc networks are distributed systems made of wireless mobile nodes that can freely and dyn...
Magister Scientiae - MScThis thesis proposed and presented technical details of new probabilistic me...
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The...
In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the o...
Wireless ad hoc networks are resource constraint and vulnerable to various security attacks. Trust b...
International audienceIn an ad hoc network, trust systems usually rely on both local and remote evid...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
With the present need for on the move networking, innovative technologies strive to establish a tech...
An important concept in network security is trust, interpreted as a relation among entities that par...
Evaluation of trustworthiness of participating entities is an effective method to stimulate collabor...
The main characteristics of ad hoc networks are the lack of predefined infrastructure and the dynami...
Abstract — Security issues and concerns for mobile ad-hoc networks have not yet been satisfactorily ...
Mobile ad hoc networks are distributed systems made of wireless mobile nodes that can freely and dyn...
Magister Scientiae - MScThis thesis proposed and presented technical details of new probabilistic me...
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical...
Distributed ad-hoc networks have become ubiquitous in the current technological framework. Such netw...
In this paper we propose a distributed trust model for certificate revocation in Adhoc networks. The...
In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the o...
Wireless ad hoc networks are resource constraint and vulnerable to various security attacks. Trust b...