Now showing 1 - 5 of 5
  • 2016Journal Article Editorial Contribution (Editorial, Introduction, Epilogue)
    [["dc.bibliographiccitation.firstpage","127"],["dc.bibliographiccitation.issue","1"],["dc.bibliographiccitation.journal","Mobile Networks and Applications"],["dc.bibliographiccitation.lastpage","129"],["dc.bibliographiccitation.volume","21"],["dc.contributor.author","Suzuki, Junichi"],["dc.contributor.author","Memarmoshrefi, Parisa"],["dc.contributor.author","Nakano, Tadashi"],["dc.date.accessioned","2018-11-07T10:18:24Z"],["dc.date.available","2018-11-07T10:18:24Z"],["dc.date.issued","2016"],["dc.identifier.doi","10.1007/s11036-016-0706-8"],["dc.identifier.isi","000373683400010"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/41432"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Springer"],["dc.relation.issn","1572-8153"],["dc.relation.issn","1383-469X"],["dc.title","Editorial: Advances on Bio-inspired Information, Communication and Computational Systems"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dc.type.subtype","editorial_ja"],["dspace.entity.type","Publication"]]
    Details DOI WOS
  • 2022Journal Article
    [["dc.bibliographiccitation.firstpage","15685"],["dc.bibliographiccitation.issue","17"],["dc.bibliographiccitation.journal","IEEE Internet of Things Journal"],["dc.bibliographiccitation.lastpage","15696"],["dc.bibliographiccitation.volume","9"],["dc.contributor.author","Yuan, Yachao"],["dc.contributor.author","Yuan, Yali"],["dc.contributor.author","Memarmoshrefi, Parisa"],["dc.contributor.author","Baker, Thar"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2022-10-04T10:22:13Z"],["dc.date.available","2022-10-04T10:22:13Z"],["dc.date.issued","2022"],["dc.identifier.doi","10.1109/JIOT.2022.3153271"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/114614"],["dc.notes.intern","DOI-Import GROB-600"],["dc.relation.eissn","2327-4662"],["dc.relation.eissn","2372-2541"],["dc.title","LbSP: Load-Balanced Secure and Private Autonomous Electric Vehicle Charging Framework With Online Price Optimization"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2017Journal Article
    [["dc.bibliographiccitation.firstpage","24139"],["dc.bibliographiccitation.journal","IEEE Access"],["dc.bibliographiccitation.lastpage","24161"],["dc.bibliographiccitation.volume","5"],["dc.contributor.author","Zhang, Hang"],["dc.contributor.author","Wang, Xi"],["dc.contributor.author","Memarmoshrefi, Parisa"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2020-12-10T18:26:13Z"],["dc.date.available","2020-12-10T18:26:13Z"],["dc.date.issued","2017"],["dc.identifier.doi","10.1109/ACCESS.2017.2762472"],["dc.identifier.eissn","2169-3536"],["dc.identifier.purl","https://resolver.sub.uni-goettingen.de/purl?gs-1/14991"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/75996"],["dc.notes.intern","DOI Import GROB-354"],["dc.notes.intern","Merged from goescholar"],["dc.rights","Goescholar"],["dc.rights.uri","https://goescholar.uni-goettingen.de/licenses"],["dc.title","A Survey of Ant Colony Optimization Based Routing Protocols for Mobile Ad Hoc Networks"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dc.type.version","published_version"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2018Journal Article
    [["dc.bibliographiccitation.firstpage","85"],["dc.bibliographiccitation.issue","1"],["dc.bibliographiccitation.journal","Communications of the ACM"],["dc.bibliographiccitation.lastpage","93"],["dc.bibliographiccitation.volume","62"],["dc.contributor.author","Casey, William"],["dc.contributor.author","Kellner, Ansgar"],["dc.contributor.author","Memarmoshrefi, Parisa"],["dc.contributor.author","Morales, Jose Andre"],["dc.contributor.author","Mishra, Bud"],["dc.date.accessioned","2019-07-30T10:52:05Z"],["dc.date.available","2019-07-30T10:52:05Z"],["dc.date.issued","2018"],["dc.description.abstract","Classical mathematical game theory helps to evolve the emerging logic of identity in the cyber world."],["dc.identifier.doi","10.1145/3190836"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/62196"],["dc.language.iso","en"],["dc.relation.issn","0001-0782"],["dc.title","Deception, identity, and security. The game theory of sybil attacks"],["dc.type","journal_article"],["dc.type.internalPublication","yes"],["dspace.entity.type","Publication"]]
    Details DOI
  • 2016Conference Paper
    [["dc.bibliographiccitation.firstpage","149"],["dc.bibliographiccitation.issue","1"],["dc.bibliographiccitation.journal","Mobile Networks and Applications"],["dc.bibliographiccitation.lastpage","160"],["dc.bibliographiccitation.volume","21"],["dc.contributor.author","Memarmoshrefi, Parisa"],["dc.contributor.author","Seibel, Roman"],["dc.contributor.author","Hogrefe, Dieter"],["dc.date.accessioned","2018-11-07T10:18:24Z"],["dc.date.available","2018-11-07T10:18:24Z"],["dc.date.issued","2016"],["dc.description.abstract","In mobile ad-hoc networks (MANETs), where there is no centralized authority to provide authentication, trust and reputation mechanisms are applied to maintain security by identifying trustworthy and untrustworthy nodes. However, traditional authentication mechanisms are not viable for MANETs due to the lack of infrastructure and frequent topology changes. In this paper, we propose a self-organized and localized public key authentication mechanism based on ant colony systems. Every node generates its own public-private key pair, issues certificates to neighboring nodes and provides on-demand authentication services by means of gathering certificate chains towards a target node. Pheromone concentration left by ants along the path of the certificate chains represents the trust level of a node towards other nodes. This model is able to authenticate public keys by selecting the most trustworthy certificate chains gathered by ants and can identify and exclude certificate chains with malicious nodes."],["dc.identifier.doi","10.1007/s11036-016-0703-y"],["dc.identifier.isi","000373683400013"],["dc.identifier.uri","https://resolver.sub.uni-goettingen.de/purl?gro-2/41433"],["dc.notes.status","zu prüfen"],["dc.notes.submitter","Najko"],["dc.publisher","Springer"],["dc.publisher.place","Dordrecht"],["dc.relation.conference","8th International Conference on Bio-Inspired Information and Communications Technologies (BICT)"],["dc.relation.eventlocation","Boston, MA"],["dc.relation.issn","1572-8153"],["dc.relation.issn","1383-469X"],["dc.title","Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks"],["dc.type","conference_paper"],["dc.type.internalPublication","yes"],["dc.type.peerReviewed","yes"],["dc.type.status","published"],["dspace.entity.type","Publication"]]
    Details DOI WOS