Author:
Jia Mei-juan,Wang Hui-qiang,Lin Jun-yu,Feng Guang-sheng,Yu Hai-tao
Publisher
Zhejiang University Press
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing
Reference34 articles.
1. Almenárez, F., Marín, A., Díaz, D., et al., 2011. Trust management for multimedia P2P applications in autonomic networking. Ad Hoc Netw., 9(4): 687–697. http://dx.doi.org/10.1016/j.adhoc.2010.09.005
2. Al-Oufi, S., Kim, H.N., El Saddik, A., 2012. A group trust metric for identifying people of trust in online social networks. Expert Syst. Appl., 39(18): 13173–13181. http://dx.doi.org/10.1016/j.eswa.2012.05.084
3. Castro, M.C., Kassler, A.J., Chiasserini, C.F., et al., 2009. Peer-to-peer overlay in mobile ad-hoc networks. In: Shen, X.M., Yu, H., Buford, J., et al. (Eds.), Handbook of Peer-to-Peer Networking. Springer US,p.1045–1080. https://doi.org/10.1007/978-0-387-09751-0_37
4. Chang, B.J., Kuo, S.L., 2009. Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs. IEEE Trans. Veh. Technol., 58(4): 1846–1863. http://dx.doi.org/10.1109/TVT.2008.2005415
5. Chen, X., Proulx, B., Gong, X.W., et al., 2015. Exploiting social ties for cooperative D2D communications: a mobile social networking case. IEEE/ACM Trans. Netw., 23(5): 1471–1484. http://dx.doi.org/10.1109/TNET.2014.2329956