[1]
I. Stoica, R. Morris, D. Karger, et al.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. ACM SIGCOMM Computer Communication Review, Proceedings of the 2001 SIGCOMM conference, Vol. 31(4), October 2001: 149-160.
DOI: 10.1145/964723.383071
Google Scholar
[2]
F. G. Marmol, G. M. Perez: TRIP: a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. Journal of Network and Computer Applications, 2012, 35: 934-941.
DOI: 10.1016/j.jnca.2011.03.028
Google Scholar
[3]
M. Li, X. Sun, H. Wang, et al.: Privacy-aware access control with trust management in web service. World Wide Web, 2011, 14: 407-430.
DOI: 10.1007/s11280-011-0114-8
Google Scholar
[4]
M. Omar, Y. Challal, A. Bouabdallah: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy. Journal of Network and Computer Applications, 2012, 35: 268-286.
DOI: 10.1016/j.jnca.2011.08.008
Google Scholar
[5]
S. Bahtiyar, C. M. Ufuk: Extracting trust information from security system of a service. Journal of Network and Computer Applications, 2012, 35: 480-490.
DOI: 10.1016/j.jnca.2011.10.002
Google Scholar
[6]
Y. A. Kim, R. Phalak: A trust prediction framework in rating-based experience sharing social networks without a Web of Trust, Information Sciences, 2012, 191: 128-145.
DOI: 10.1016/j.ins.2011.12.021
Google Scholar
[7]
Y. Yu, K. Li, W. Zhou, et al.: Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 2012, 35: 867-880.
DOI: 10.1016/j.jnca.2011.03.005
Google Scholar
[8]
H. Xia, Z. Jia, X. Li, et al.: Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 2012, 2: 1-19.
DOI: 10.1016/j.adhoc.2012.02.009
Google Scholar
[9]
J. H. Cho, A. Swami, I. R. Chen: Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications, 2012, 35: 1001-1012.
DOI: 10.1016/j.jnca.2011.03.016
Google Scholar