[1] |
MURPHY S , BADGER M , WELLINGTON B . OSPF with digital signatures[EB/OL]. IEEE Wireless Communications Magazine, .
|
[2] |
MURPHY S , BADGER M . Digital signature protection of the OSPF routing protocol[A]. Proceedings of the Symposium on Network and Distributed System Sercurity[C]. Washington DC,USA, 1996. 93-102.
|
[3] |
李道丰, 杨义先, 谷利泽 . 采用可净化签名的OSPF协议安全保护机制[J]. 北京邮电大学学报 2011,34(3):79-83. LI D F , YANG Y X , GU L Z . Secure protection mechanism for OSPF protocol with sinitizable signature scheme[J]. Journal of Beijing University of Posts and Telecommunications, 2011,34(3):79-83.
|
[4] |
KENT S , LYNN C , SEO K . Secure border gateway protocol (SBGP)[J]. IEEE Journal on Selected Areas in Communications, 2000,18(4): 582-592.
|
[5] |
SANZGIRI K , DAHILL B , LEVINE B N . A secure routing protocol for ad hoc networks[A]. Proeedings of the 10th IEEE International Conference on Network Protocols[C]. Paris,France, 2002.
|
[6] |
PENG S C , JIA W J , MACIEL T . Voting-based clustering algorithm with subjective trust and stability in mobile ad-hoc networks[A]. Proceedings of IEEE/IFIP International Conference on Embedded and Ubiquitous-Computing[C]. Washington,DC,USA, 2008. 3-9.
|
[7] |
SUN Y X , HUANG S H , CHEN L . Bayesian decision-making based recommendation trust revision model in ad hoc networks[J]. Journal of Software, 2009,20(9): 2574-2586.
|
[8] |
喻莉, 李静茹, 刘祖浩 . 基于自适应遗忘机制的半环信任模型[J]. 电子信息学报 2011,33(1):175-179. YU L , LI J R , LIU Z H . Semiring trust model based on adaptive forgetting scheme[J]. Journal of Electronics & Information Technology, 2011,33(1): 175-179.
|
[9] |
许智君, 胡琪一, 张玉军 . MANET网络激励节点协作的信任评估路由协议[J]. 通信学报 2012,33(7):27-35. XU Z J , HU Q Y , ZHANG Y J . Trust evaluation routing protocol to enforce cooperation in mobile adhoc networks[J]. Journal on Communications, 2012,33(7): 27-35.
|
[10] |
王丽娜, 赵磊, 郭迟 . 一种基于信任理论的路由安全接入与选路模型[J]. 武汉大学学报 2008,10(10):999-1002. WANG L N , ZHAO L , GUO C . A network connection and routing model based on trust theory[J]. Geomatics and Information Science of Wuhan University, 2008,10(10):999-1002.
|
[11] |
贺利坚, 黄厚宽, 张伟 . 多Agent系统中信任和信誉系统研究综述[J]. 计算机研究与发展 2008,45(07):1151-1160. HE L J , HUANG H K , ZHANG W . A survey of trust and reputation systems in multi-agent systems[J]. Journal of Computer Research and Development, 2008,45(07):1151-1160.
|
[12] |
DUMA C , SHAHMEHRI N , CARONNI G . Dynamic trust metrics for peer-to-peer systems[A]. Proceedings of the 16th Intel Joint Workshop on Database and Expert Systems Applications[C]. Washington DC,USA, 2005. 776-781.
|
[13] |
魏世孝, 周献中 . 多属性决策理论方法及其在C3I系统中的应用[M]. 北京: 国防工业出版社, 1998. 31-45. WEI S X , ZHOU X Z . Multiple Attribute Decision Making Principle and Its Application In C3I System[M]. Beijing: National Defense Industry Press, 1998. 31-45.
|
[14] |
甘早斌, 丁倩, 李开 . 基于声誉的多维度信任计算算法[J]. 软件学报 2011,22(10):2401-2411. GAN Z B , DING Q , LI K . Reputation-based multi-dimensional trust algorithm[J]. Journal of Software, 2011,22(10):2401-2411.
|
[15] |
洪亮, 洪帆, 彭冰 . 一种基于邻居信任评估的虫洞防御机制[J]. 计算机科学 2006,33(8):130-133. HONG L , HONG F , PENG B . Defend against wormhole attack based on neighbor trust evaluation in MANET[J]. Computer Science, 2006,33(8):130-133.
|
[16] |
邓聚龙, 孙建华 . 灰色系统理论教程[M]. 武汉: 华中理工大学出版社, 1990. 128-134. DENG J L . Grey System Theory Tutorial[M]. Wuhan: Huazhong University Press, 1990. 128-134.
|
[17] |
徐兰芳, 胡怀飞, 桑子夏 . 基于灰色系统理论的信誉报告机制[J]. 软件学报 2007,18(7):1730-1737. XU L F , HU H F , SANG Z X . A prestige reporting mechanism based on gray system theory[J]. Journal of Software, 2007,18(7):1730-1737.
|
[18] |
徐兰芳, 张大圣, 徐凤鸣 . 基于灰色系统理论的主观信任模型[J]. 小型微型计算机系统 2007,28(5):801-804. XU L F , ZHANG D S , XU F M . Subjective trust model based on grey system theory[J]. Journal of Chinese Computer Systems, 2007,28(5):801-804.
|