Filter your results
- 6
- 6
- 6
- 1
- 1
- 1
- 2
- 1
- 6
- 6
- 2
- 3
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs4th IFIP WG 11.11 International on Trust Management (TM), Jun 2010, Morioka, Japan. pp.141-156, ⟨10.1007/978-3-642-13446-3_10⟩
Conference papers
hal-01061322v1
|
||
|
Trust-Threshold Based Routing in Delay Tolerant Networks5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.265-276, ⟨10.1007/978-3-642-22200-9_21⟩
Conference papers
hal-01568686v1
|
||
|
A Provenance-Based Trust Model for Delay Tolerant Networks6th International Conference on Trust Management (TM), May 2012, Surat, India. pp.52-67, ⟨10.1007/978-3-642-29852-3_4⟩
Conference papers
hal-01517651v1
|
||
|
On Tradeoffs between Trust and Survivability Using a Game Theoretic Approach5th International Conference on Trust Management (TM), Jun 2011, Copenhagen, Denmark. pp.190-205, ⟨10.1007/978-3-642-22200-9_16⟩
Conference papers
hal-01568676v1
|
||
|
Toward Software Diversity in Heterogeneous Networked Systems28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.114-129, ⟨10.1007/978-3-662-43936-4_8⟩
Conference papers
hal-01284848v1
|
||
|
Defensive Resource Allocations with Security Chokepoints in IPv6 Networks29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.261-276, ⟨10.1007/978-3-319-20810-7_19⟩
Conference papers
hal-01745826v1
|