1. S. Buchegger, J.-Y.L. Boudec, Performance analysis of the confidant protocol, in: MobiHoc’02: Proceedings of the 3rd ACM international symposium on Mobile Ad-hoc networking & computing, ACM, New York, NY, USA, 2002, pp. 226–236.
2. Self-policing mobile ad-hoc networks by reputation;Buchegger;IEEE Commun. Mag.,2005
3. M.T. Refaei, V. Srivastava, L. DaSilva, M. Eltoweissy, A reputation-based mechanism for isolating selfish nodes in ad hoc networks, in: MOBIQUITOUS’05: Proceedings of The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, IEEE Computer Society, Washington, DC, USA, 2005, pp. 3–11.
4. Y. Rebahi, V. Mujica, D. Sisalem, A reputation-based trust mechanism for ad hoc networks, in: ISCC’05: Proceedings of the 10th IEEE Symposium on Computers and Communications, IEEE Computer Society, Washington, DC, USA, 2005, pp. 37–42.
5. F. Azzedin, A. Ridha, A. Rizvi, Fuzzy trust for peer-to-peer based systems, in: Proceedings of World Academy of Science, Engineering and Technology 2007 PWASET 2007, 2007, pp. 123–127.