S. M. Alam and S. Fahmy, Energy-efficient provenance transmission in large-scale wireless sensor networks, IEEE Int'l Symposium on a World of Wireless, Mobile and Multimedia Networks, 2011.

I. R. Chen, F. Bao, M. Chang, and J. H. Cho, Trust management for encounter-based touting in delay tolerant networks, IEEE Global Telecommunications Conf, pp.1-6, 2010.
DOI : 10.1109/glocom.2010.5683235

J. H. Cho, A. Swami, and I. R. Chen, A Survey on Trust Management for Mobile Ad Hoc Networks, IEEE Communications Surveys & Tutorials, vol.13, issue.4, pp.562-583, 2011.
DOI : 10.1109/SURV.2011.092110.00088

C. Dai, D. Lin, E. Bertino, and M. Kantarcioglu, An Approach to Evaluate Data Trustworthiness Based on Data Provenance, Proc. 5 th VLDB Workshop on Secure Data Management, pp.82-98, 2008.
DOI : 10.1007/978-3-540-85259-9_6

J. Freire, D. Koop, E. Santos, and C. T. Silva, Provenance for Computational Tasks: A Survey, Computing in Science & Engineering, vol.10, issue.3, pp.11-21, 2008.
DOI : 10.1109/MCSE.2008.79

J. Golbeck, Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering, Provenance and Annotation of Data, pp.101-108, 2006.
DOI : 10.1007/11890850_12

H. S. Lim, Y. Moon, and E. Bertino, Provenance-based trustworthiness assessment in sensor networks, Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN '10, 2010.
DOI : 10.1145/1858158.1858162

Y. Liu, J. Futrelle, J. Myers, A. Rodriguez, and R. Kooper, A provenance-aware virtual sensor system using the Open Provenance Model, 2010 International Symposium on Collaborative Technologies and Systems, pp.330-339, 2010.
DOI : 10.1109/CTS.2010.5478496

P. Mcdaniel, Data Provenance and Security, IEEE Security & Privacy Magazine, vol.9, issue.2, pp.83-85, 2011.
DOI : 10.1109/MSP.2011.27

L. Moreau, J. Freire, J. Futrelle, R. E. Mcgrath, J. Myers et al., The open provenance model: an overview, " Int'l Provenance and Annotation Workshop, LNCS, vol.5272, pp.323-326, 2008.
DOI : 10.1007/978-3-540-89965-5_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.7394

S. Rajbhandari, I. Wootten, A. S. Ali, and O. F. Rana, Evaluating Provenance-based Trust for Scientific Workflows, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06), pp.365-372, 2006.
DOI : 10.1109/CCGRID.2006.43

T. Spyropoulos, R. N. Rais, T. Turletti, K. Obraczka, and A. Vasilakos, Routing for disruption tolerant networks: taxonomy and design, Wireless Networks, vol.7, issue.4, pp.2349-2370, 2010.
DOI : 10.1007/s11276-010-0276-9

URL : http://escholarship.org/uc/item/7ws78441.pdf

M. Srivatsa, W. Gao, and A. Iyengar, Provenance-driven data dissemination in disruption tolerant networks, Proc. 14 th Int'l Conf. on Information Fusion, 2011.

S. Sultana, E. Bertino, and M. Shehab, A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks, 2011 31st International Conference on Distributed Computing Systems Workshops, pp.332-338, 2011.
DOI : 10.1109/ICDCSW.2011.54

X. Wang, K. Govindan, and P. Mohapatra, Collusion-resilient quality of information evaluation based on information provenance, th Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, pp.395-403, 2011.

B. Yu, S. Kallurkar, and R. Flo, A Demspter-Shafer approach to provenance-aware trust assessment, Int'l Symposium on Collaborative Technologies and Systems, pp.383-390, 2008.