Protect your privacy: a guide for PGP users
Protect your privacy: a guide for PGP users
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Trust Metrics, Models and Protocols for Electronic Commerce Transactions
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Toward acceptable metrics of authentication
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A survey of trust and reputation systems for online service provision
Decision Support Systems
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Information theoretic framework of trust modeling and evaluation for ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Personal area networks (PANs) are gaining popularity. Authenticating the communication parties and securing the transmitted data have been recognized as an important but difficult problem. Since various devices are from different vendors and they may frequently join and leave a network, traditional key provision solutions cannot tackle complicated and dynamic cases. In this paper, we proposed an effective approach of trust establishment and designed three modes to meet different requirements. The proposed scheme is evaluated through ample simulations and significant performance advantage is observed. With this approach, numerous personal devices can promptly build trust and get authentication.