[1]Zhou Runfang, Hwang Kai. Power trust: A robust and scalable reputation system for trusted peertopeer computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460473.[2]Zhang Mingwu, Yang Bo, Qi Yu, et al. Using trust metric to detect malicious behaviors in WSNs [C]// Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Qingdao, China: IEEE Computer Society Press, 2007: 104108.[3]李柏岩,姚文胜,尤晋元.基于信任逻辑的PKI互通信任模型形式化[J]. 上海交通大学学报, 2004, 38(10): 154158.LI Baiyan, YAO Wensheng, YOU Jinyuan. Formalizing PKI interoperability trust models with trust logic [J]. Journal of Shanghai Jiaotong University, 2004, 38(10): 154158.[4]Kamvar S D, Schlosser M T. EigenRep: Reputation management in P2P networks [C]// Proceedings of the 12th International World Wide Web Conference. Budapest: ACM Press, 2003: 123134.[5]孙知信, 唐益慰. 基于全局信任度的多层分组P2P信任模型[J]. 通信学报, 2007, 28(9): 133140.SUN Zhixin, TANG Yiwei. Multilayer and grouping P2P trust model based on global reputation [J]. Journal on Communications, 2007, 28(9): 133140.[6]Wang Kun, Wu Meng. A trust approach for node cooperation in MANET[C]// Proceedings of the 3rd International Conference on Mobile Adhoc and Sensor Network. Beijing, China: Springer Press, LNCS 4864, 2007: 481491.[7]Levien R, Aiken A. Attackresistant trust metrics for public key certification [C]// Proceedings of the 7th USENIX Security Symposium. San Antonio, TX: USENIX Association, 1998: 229242.[8]Mui L. Computational models of trust and reputation: Agents, evolutionary games, and social networks [D]. USA: MIT, 2003. [9]Buchegger S, Le Boudec J Y. Performance analysis of the CONFIDANT protocol (Cooperation of NodesFairness in Dynamic AdHoc NeTworks) [C]// Proceedings of the 3rd ACM International Symposium of Mobile MANET Networking and Computing. San Antonio, TX: ACM Press, 2002: 8091. |