1. Murphy S, Badger M R. Digital signature protection of the OSPF routing protocol. Proceedings of the Symposium on Network and Distributed System Sercurity (SNDSS’96), Feb 22-23, 1996, San Diego, CA, USA. Piscataway, NJ, USA: IEEE, 1996: 93-102
2. Li D F, Yang Y X, Gu L Z. Secure protection mechanism for OSPF protocol with sinitizable signature scheme. Journal of Beijing University of Posts and Telecommunications, 2011, 34(3): 79-83 (in Chinese)
3. Zhao C, Sun B, Yang Y X. A lightweight mechanism for border gateway protocol path verification. Journal of Electronics & Information Technology, 2012, 34(9): 2167-2173 (in Chinese)
4. Huston G, Rossi M, Armitage G. Security BGP-A literature survey. IEEE Communications Surveys and Tutorials, 2011, 13(2): 199-222
5. Xu Z J, Hu Q Y, Zhang Y J. Trust evaluation routing protocol to enforce cooperation in mobile ad hoc networks. Journal of Communications, 2012, 33(7): 27-35 (in Chinese)
6. Momani M. Bayesian fusion algorithm for inferring trust in wireless sensor networks. Journal of Networks, 2010, 5(7): 815-822
7. Sun Y X, Huang S H, CHEN L J. Bayesian decision-making based recommendation trust revision model in ad hoc network. Journal of Software, 2009, 20( 9): 2574-2586 (in Chinese)
8. Yu L, Li J R, Liu Z H. Semiring trust model based on adaptive forgetting scheme. Journal of Electronics & Information Technology, 2011, 33(1):175-179 (in Chinese)
9. Wang L N, Zhao L, Guo C. A network connection and routing model based on trust theory. Geomatics and Information Science of Wuhan University, 2008, 10(10): 999-1002 (in Chinese)
10. Du J, Li W H. Security trust model for multi hop wireless ad hoc networks. Journal of Jilin University: Engineering and Technology Edition, 2011, 9(5): 1421-1425 (in Chinese)
11. Hwang Y F, Wang J Y, Zhang J Q. Bayesian inference of genetic regulatory networks from time series microarray data using dynamic Bayesian networks. Journal of Multimedia, 2007, 2(3): 46-55
12. Zhang Q, Zhang X, Wen X Z. Construction of peer-to-peer multiple-grain trust model. Journal of Software, 2006, 17(1): 96-107 (in Chinese)
13. Li X Y, Gui X L. Trust quantitative model with multiple decision factorsin trusted network. Chinese Journal of Computers, 2009, 32(3): 405-415 (in Chinese)
14. GAN Z B, DING Q, LI K. Reputation-based multi-dimensional mensional trust algorithm. Journal of Software, 2011, 22(10): 2401-2411 (in Chinese) |