Author of the publication

A Survey on Trust and Reputation Schemes in Ad Hoc Networks.

, , , and . ARES, page 881-886. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile., and . SecITC, volume 11359 of Lecture Notes in Computer Science, page 218-233. Springer, (2018)Securing the AODV protocol using specification-based intrusion detection., , and . Q2SWinet, page 33-36. ACM, (2006)Integrating Formal Analysis and Design to Preserve Security Properties., , , and . HICSS, page 1-10. IEEE Computer Society, (2009)A rigorous methodology for security architecture modeling and verification., and . CSIIRW, page 13:1-13:3. ACM, (2008)Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes., , and . SECRYPT, page 69-74. INSTICC Press, (2009)Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection., , and . SECRYPT, page 63-68. INSTICC Press, (2006)Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study., , , and . CSE (3), page 213-218. IEEE Computer Society, (2009)Nedgty: Web Services Firewall., , , , and . ICWS, page 597-601. IEEE Computer Society, (2005)Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements., , , and . ARES, page 1443-1450. IEEE Computer Society, (2008)Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements., , , and . IET Softw., 4 (2): 149-160 (2010)