Login / Signup
A Secure Network Admission and Routing Model Based on Trust Theory.
Chi Guo
Lei Zhao
Lina Wang
Zhejun Fang
Published in:
ICYCS (2008)
Keyphrases
</>
network topologies
network communication
computer networks
wireless ad hoc networks
network topology
trust relationships
network structure
network routing
inter domain
traffic load
communication networks
routing problem
malicious nodes
application level
network design
theory revision
network management
network nodes
network traffic
complex networks
switched networks
electronic commerce
secure routing