专题首页
中图分类法(4)
社会科学总论(3)
军事(1)
在“
自然资源管理
”中,
命中:
4
条,耗时:小于0.01 秒
1.
Stalk and lie—The cost of Sybil attacks in
opportunistic
networks
作者:
Sacha Trifunovic
;
a
;
sascha.trifunovic@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
trifunovic@tik.ee.ethz.ch" class="auth_mail" title="E-mail the corresponding author
;
Andreea Hossmann-Picub
关键词:
Sybil attack
;
Opportunistic
networking
;
Trust
;
Community structure
;
Social network
刊名:Computer Communications
年:2016
2.
PECEVA: An adaptable and energy-saving credential validation solution for pervasive networks
作者:
Florina Almenareza
;
M. Francisca Hinarejos
;
b
;
xisca.hinarejos@uib.es" class="auth_mail" title="E-mail the corresponding author
;
André
;
s Marí
;
na
;
Josep-Lluí
;
s Ferrer-Gomilab
;
Daniel Dí
;
az Sá
;
ncheza
关键词:
Certificate validation efficiency
;
PKIX
;
Pervasive networks
;
Trust management
;
Decision engine
刊名:Information Sciences
年:2016
3.
Scheme for Expanding the Capacity of Wireless Access Infrastructures through the Exploitation of
Opportunistic
Networks
作者:
Andreas Georgakopoulos (1) andgeorg@unipi.gr Dimitrios Karvounas (1) dkarvoyn@unipi.gr Vera Stavroulaki (1) veras@unipi.gr Kostas Tsagkaris (1) ktsagk@unipi.gr Milenko Tosic (2) milenko.tosic@lacitadelleing.com Dragan Boskovic (2) dragan.boskovic@lacitadelleing.com Panagiotis Demestichas (1) pdemest@unipi.gr
关键词:
opportunistic
networks –
;
operator
;
governance –
;
infrastructure capacity extension –
;
wireless access
刊名:Mobile Networks and Applications
年:2012
4.
Anomaly Detection and Mitigation for Disaster Area Networks
作者:
Jordi Cucurull
;
Mikael Asplund
;
Simin Nadjm-Tehrani
刊名:Lecture Notes in Computer Science
年:2010
1
按检索点细分(4)
关键词(1)
摘要(4)
按年细分(4)
2016年(2)
2012年(1)
2010年(1)
按来源细分(4)
Elsevier(2)
Springer(2)
按类型细分(4)
期刊(4)