共 19 条
- [1] Shamir A., Identity-based cryptosystems and signature schemes, Proc. of the Application of Cryptographic Techniques, 21, 2, pp. 47-53, (1984)
- [2] Luo C.Y., Huo S.W., Xing H.Z., Identity-based cross-domain authentication scheme in pervasive computing environments, Journal on Communications, 32, 9, pp. 111-122, (2011)
- [3] Li Y., Chen W., Cai Z., Et al., CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks, Wireless Networks, 22, 8, pp. 1-13, (2016)
- [4] Yuan C., Zhang W., Wang X., EIMAKP: heterogeneous cross-domain authenticated key agreement protocols in the EIM System, Arabian Journal for Science and Engineering, 42, 8, pp. 3275-3287, (2017)
- [5] Blaze M., Feigenbaum J., Lacy J., Decentralized trust management, Proc. of the 17th IEEE Symposium on Security and Privacy, pp. 164-173, (1996)
- [6] Tang W., Chen Z., Research of subjective trust management model based on the fuzzy set theory, Journal of Software, 14, 8, pp. 1401-1408, (2003)
- [7] Chandran K., Shanmugasudaram V., Subramani K., Designing a fuzzy-logic based trust and reputation model for secure resource allocation in cloud computing, International Arab Journal of Information Technology, 13, 1, pp. 30-37, (2016)
- [8] Cerutti F., Toniolo A., Oren N., Et al., Subjective logic operators in trust assessment: an empirical study, Information Systems Frontiers, 17, 4, pp. 743-762, (2015)
- [9] Chiregi M., Navimipour N.J., A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities, Computers in Human Behavior, 60, pp. 280-292, (2016)
- [10] Zhang T., Yan L., Yang Y., Trust evaluation method for clustered wireless sensor networks based on cloud model, Wireless Networks, 24, 3, pp. 777-797, (2018)