1. Bok, K., Yoon, S., & Yoo, J. (2018). Trust evaluation of multimedia documents based on extended provenance model in social semantic web. Multimedia Tools and Applications, 1–22.
2. Anakath, A. S., Rajakumar, S., & Ambika, S. (2017). Privacy preserving multi factor authentication using trust management. Cluster Computing, 1–7.
3. Singh, O., Singh, J., & Singh, R. Multi-level trust-based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET. Cluster Computing, 1–13.
4. Kim, M., & Park, S. O. (2013). Group affinity based social trust model for an intelligent movie recommender system. Multimedia Tools and Applications, 64(2), 505–516.
5. Li, H., Zhang, S., Hu, Y., Shi, J., & Zhong, Z.-m. (2017). Research of social recommendation based on social tag and trust relation. Cluster Computing, 1–11.