计算机技术﹑电信技术 |
|
|
|
|
面向移动自组网的信任数据自存储模型 |
高键鑫, 吴旭升, 高嵬, 张文兵 |
海军工程大学 电气工程系,湖北 武汉 430033 |
|
Self-archiving model of trust data for mobile ad hoc network |
GAO Jian-xin, WU Xu-sheng, GAO Wei, ZHANG Wen-bing |
Department of Electrical Engineering, Naval University of Engineering, Wuhan 430033, China |
[1] QIN F L, GE L S, LIU Q, et al. Free riding analysis of peer to peer streaming systems [J]. Journal of Computational Information Systems, 2011, 7(3): 721-728.
[2] DIAN S M, RAMADOSS B. A trust agent based incentive mechanism for file sharing in P2P networks [C] ∥ 2nd International Conference on Trends in Information Sciences and Computing Proceeding. Chennai: IEEE, 2010: 167-170.
[3] 方群,吴国新,吴鹏,等.P2P网络信任数据存储机制综述[J].计算机科学,2008,35(11): 23-27.
FANG Qun, WU Guo-xin, WU Peng, et al. Survey of trust data storage mechanism in peer-to-peer network [J]. Computer Science, 2008, 35(11): 23-27.
[4] SEPANDAR D K, MARIO T S, HECTOR G M. The EigenTrust algorithm for reputation management in P2P networks [C] ∥ Proceedings of the 12th International Conference on World Wide Web. Budapest: ACM, 2003: 640-650.
[5] ZHOU R, HWANG K. PowerTrust: a robust and scalable reputation system for trusted Peer-to-Peer computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473.
[6] XIONG L, LU L. PeerTrust: supporting reputation-based trust for Peer-to-Peer electronic communities [J]. IEEE Transactions on Knowledge Data Engineering, 2004, 16(7): 843-857.
[7] FEDOTOVA N, VELTRI L. Reputation management algorithms for DHT-based peer-to-peer environment [J]. Computer Communications, 2009, 32(12): 1400-1409.
[8] LEE S, SHERWOOD R, BHATTACHARJEE B. Cooperative peer groups in NICE [C] ∥Infocom Twenty-second Joint Conference of the IEEE Computer and Communications IEEE Societies. San Francisco: IEEE, 2003: 1272-1282.
[9] 蒋黎明,张琨,徐建,等.证据信任模型中的信任传递与聚合研究[J].通信学报,2011,32(8): 91-100.
JIANG Li-ming, ZHANG Kun, XU Jian, et al. Research on trust transitivity and aggregation in evidential trust model [J]. Journal on Communications, 2011,32(8): 91-100.
[10] 秦艳琳,吴晓平,高键鑫.分布式环境下信任路径选择性搜索及聚合研究[J].通信学报,2012,33(Z1): 148-156.
QIN Yan-lin, WU Xiao-ping, GAO Jian-xin. Research on selective trust-path search and aggregation in distributed environment [J]. Journal on Communications, 2012, 33(Z1): 148-156.
[11] SEN J. A secure and efficient searching scheme for trusted nodes in a peer-to-peer network [C]∥ Lecture Notes in Computer Science, 2011: 100-108.
[12] ZHAO H Y, YANG X, LI X L. cTrust: trust aggregation in cyclic mobile ad hoc networks [C]∥ Lecture Notes in Computer Science, 2010: 454-465.
[13] 刘连东,冀会芳,韩文报,等.一种无随机预言机的无证书广义签密方案[J]. 软件学报,2012,23(2): 394-410.
LIU Lian-dong, JI Hui-fang, HAN Wen-bao, et al. Certificateless generalized signcryption scheme without random oracles [J]. Journal of Software, 2012, 23(2): 394-410.
[14] ENOS G, ZHENG Y L. An ID-based signcryption scheme with compartmented secret sharing for unsigncryption [J]. Information Processing Letters, 2015, 115: 128-133.
[15] 王圣宝,刘文浩,谢琪.无双线性配对的无证书签名方案[J].通信学报,2012,33(4): 93-98.
WANG Sheng-bao, LIU Wen-hao, XIE Qi. Cerificateless signature scheme without bilinear pairings [J]. Journal on Communications, 2012,33(4): 93-98.
[16] GODOR G, IMRE S. Security analysis of the simple lightweight authentication protocol [C]∥ Ninth International Conference on Networks. French Alps: IEEE, 2010: 231-236. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|