Export 29 results:
Sort by: Filters: Author is J. H. Cho [Clear All Filters]
"Composite Trust-based Public Key Management in Mobile Ad Hoc Networks",
ACM 28th Symposium on Applied Computing, Coimbra, Portugal, 03/2013.
"Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing",
IEEE Transactions on Parallel and Distributed Systems, 2013.
"On the Tradeoff between Altruism and Selfishness in MANET Trust Management",
Ad Hoc Networks, 2013.
"Trust-based Task Assignment in Military Tactical Networks",
17th International Command and Control Research and Technology Symposium, Fairfax, VA, USA, 06/2012.
"A Provenance-based Trust Model for Delay Tolerant Networks",
6th IFIP WG 11.11 International Conference on Trust Management, India, 05/2012.
"Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing and Intrusion Detection",
IEEE Transactions on Network and Service Management, vol. 9, no. 2, pp. 169-183, 2012.
"Integrated Social and QoS Trust-based Routing in Delay Tolerant Networks",
Wireless Personal Communications, vol. 66, no. 2, pp. 443-459, 2012.
"Modeling and Analysis of Trust Management with Trust Chain Optimization in Mobile Ad Hoc Networks",
Journal of Network and Computer Applications, vol. 35, no. 3, pp. 1001–1012, 2012.
"Trust-Based Intrusion Detection in Wireless Sensor Networks",
IEEE International Conference on Communications (ICC), Kyoto, Japan, 06/2011.
"Trust-Threshold Based Routing in Delay Tolerant Networks",
The 5th IFIP International Conference on Trust Management, Copenhagen, Denmark, 06/2011.
"Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-based Routing",
ACM 26th Symposium on Applied Computing, Taichung, Taiwan, 03/2011.
"Model-based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems",
Wireless Personal Communications, vol. 60, no. 4, pp. 725-750, 2011.
"Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile Ad Hoc Networks",
Performance Evaluation, vol. 68, no. 1, pp. 58-75, 2011.
"A Survey on Trust Management for Mobile Ad Hoc Networks",
IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 562-583, 2011.
"Modeling and Analysis of Intrusion Detection Integrated with Batch Rekeying for Dynamic Group Communication Systems in Mobile Ad Hoc Networks",
ACM Wireless Networks, vol. 16, no. 4, pp. 1157-1173, 2010.
"Trust Management for Encounter-based Routing in Delay Tolerant Networks",
IEEE Global Communications Conference 2010, Miami, USA, 12/2010.
"Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs",
The 4th IFIP International Conference on Trust Management, Morioka, Japan, 06/2010.
"Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks",
IEEE Transactions on Reliability, vol. 59, no. 1, pp. 231-241, 2010.
"Modeling and Analysis of Trust Management for Cognitive Mission-driven Group Communication Systems in Mobile Ad Hoc Networks",
The 7th IEEE/IFIP International Symposium on Trusted Computing and Communications, Vancouver, Canada, 09/2009.
"Performance Analysis of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems",
IPDPS'09, Rome, Italy, 05/2009.
"Effect of Intrusion Detection on Secure Group Communications in Hierarchically Structured Group Architectures",
4th IEEE LCN Workshop on Network Security, Montreal, Canada, October 2008.
"Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks",
1st IEEE International Workshop on Applications of Ad hoc and Sensor Networks, Ginowan, Okinawa, Japan, March 2008.
"Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks",
14th IEEE Pacific Rim International Symposium on Dependable Computing, Taipei, Taiwan, December 2008.
"On optimal batch rekeying for secure group communications in wireless networks",
ACM/Springer Wireless Networks, vol. 14, no. 6, December 2008.
"Performance optimization of region-based group key management in mobile ad hoc networks",
Performance Evaluation, vol. 65, no. 5, pp. 319-344, 2008.
