Author:
Xia Hui,Jia Zhiping,Li Xin,Ju Lei,Sha Edwin H.-M.
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference35 articles.
1. Y.L. Sun, Z. Han, W. Yu, K.J. Ray Liu, Attacks on trust valuation in distributed networks, in: Proceedings of the 40th Annual Conference on Information Sciences and Systems, March 2006, pp. 1461–1466.
2. N. Griffiths, A. Jhumka, A. Dawson, R. Myers, A simple trust model for on-demand routing in mobile ad-hoc networks, in: Proceedings of International Symposium on Intelligent Distributed Computing (IDC 2008), 2008, pp. 105–114.
3. E.J. Chang, P.K. Hussain, P.S. Dillon, Fuzzy nature of trust and dynamic trust modeling in service oriented environments, in: Proceedings of the Workshop on Secure Web Services, November 2005, pp. 75–83.
4. Can we trust trust?;Gambetta,2000
5. Z. Liu, A.W. Joy, R.A. Thompson, A dynamic trust model for mobile ad hoc networks, in: Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS’04), 2004, pp. 80–85.
Cited by
132 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献