[1] |
WANG Jin, ZHANG Yonghui, GU Xiang.
Trust-aware privacy-preserving scheme for VANET
[J]. Computer Engineering and Applications, 2018, 54(6): 62-67.
|
[2] |
WANG Qian, WANG Jinhua.
Collaborative filtering recommendation algorithm combining trust mechanism with user preferences
[J]. Computer Engineering and Applications, 2015, 51(10): 261-265.
|
[3] |
LIAO Liefa, ZHANG Weinan.
Trust model of P2P system based on trade characteristics and transaction feedback
[J]. Computer Engineering and Applications, 2014, 50(20): 100-104.
|
[4] |
WANG Chao, ZHONG Hong, SHI Runhua, LU Xiaoling.
Trust evaluation model based on reputation for C2C e-commerce
[J]. Computer Engineering and Applications, 2014, 50(17): 120-124.
|
[5] |
LIN Xiaohui, HU Can, ZHANG Junling.
Utility-based node cooperation in WSNs
[J]. Computer Engineering and Applications, 2014, 50(14): 68-73.
|
[6] |
LIU Jun, TAN Deqing.
Manufacturer promotion and endogenous timing under transfer of wholesale pricing power
[J]. Computer Engineering and Applications, 2013, 49(7): 6-10.
|
[7] |
QIN Zhiguang, YANG Yi, YANG Lei, ZHONG Ting.
Using push-pull mode to achieve reputation system in P2P networks
[J]. Computer Engineering and Applications, 2013, 49(5): 88-92.
|
[8] |
YANG Zhixing, TANG Hongbo, BAI Yi, YANG Sen.
Distributed trust model for mobile P2P networks
[J]. Computer Engineering and Applications, 2013, 49(23): 75-80.
|
[9] |
LU Zhigang1,2.
Dual-fuzzy comprehensive evaluation model for subjective e-commerce reputation
[J]. Computer Engineering and Applications, 2012, 48(29): 34-41.
|
[10] |
SUN Lingling1,2, LUO Yonglong1,2, GUO Liangmin1,2, SUN Liping1,2.
Accumulated score trust model based on reputation
[J]. Computer Engineering and Applications, 2012, 48(27): 69-73.
|
[11] |
LI Zonghai1, LIU Shaojun1, WANG Yan1, WEI Chuanbo2.
Defending against wormhole attacks in wireless sensor networks
[J]. Computer Engineering and Applications, 2012, 48(27): 94-98.
|
[12] |
LI Yundi, MU Kun.
Research on dynamic trust model in open network environment
[J]. Computer Engineering and Applications, 2012, 48(23): 107-110.
|
[13] |
LI Ji,LI Gang .
P2P reputation model based on trust attenuation vector
[J]. Computer Engineering and Applications, 2011, 47(9): 86-88.
|
[14] |
ZHANG Jianzhong,LAN Xiaofeng,ZHANG Tianyan,XU Jingdong.
MSRep:Using fuzzy control method to generate reputation of email server
[J]. Computer Engineering and Applications, 2011, 47(10): 80-84.
|
[15] |
YANG Lei,ZHONG Ting,QIN Zhi-guang.
Distributed P2P trust model based double metric
[J]. Computer Engineering and Applications, 2010, 46(5): 13-16.
|