Author:
Xia Hui,Jia Zhiping,Ju Lei,Li Xin,Sha Edwin H.-M.
Funder
Natural Science Foundation of China (NSFC)
Shandong Provincial Natural Science Foundation
Outstanding Young Scientist Foundation of Shandong Province
Independent Innovation Foundation of Shandong University
Graduate Independent Innovation Foundation of Shandong University
NSF
Subject
Computer Networks and Communications
Reference31 articles.
1. Y.L. Sun, Z. Han, W. Yu, K.J. Ray Liu, Attacks on trust valuation in distributed networks, in: Proc. of the 40th Annual Conference on Information Sciences and Systems, March 2006, pp. 1461–1466.
2. S. Roy, V.G. Addada, S. Setia, S. Jajodia, Securing MAODV: attacks and countermeasures, in: Proc. of IEEE SECON’05, 2005, pp. 521–532.
3. A.A. Pirzada, C. McDonald, Trust establishment in pure ad-hoc networks, in: Wireless Personal Communications, 2006, vol. 37, pp. 39–168.
4. L. Miu, M. Mohtashemi, A. Halberstadt, A computational model of trust and reputation, in. Proc. of the 35th Annual Hawaii International Conference on System Sciences, Jan 2002.
5. Y. Wang, J. Vassileva, Trust and reputation model in peer-to-peer networks, in: Proc. of the 3rd International Conference on Peer-to-Peer Computing, 2003.
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献