2BARAS J S,JIANG Tao.Cooperation,trust and games in wireless networks[C]//Proc of Symposium on Systems,Control and Networks,Honoring Professor P.Varaiya:[s.n.],2005:183-202.
3DOUCEUR J R.The sybil attack[C]//Proc of the 1st International Workshop on Peer-to-Peer Systems (IPTP'02).2002:251-260.
4SUN Y L,HAN Z,YU W,et al.Attacks on trust evaluation in distributed networks[C]//Proc of the 40th Annual Conference on Information Sciences and Systems.2006.
5ADAR E,HUBERMAN B A.Free riding on Gnutella,SSL-00-63[R].Palo Alto:Xerox PARC,2000.
6KAMVAR S D,SCHLOSSER M T,MOLINA H G.The eigentrust algorithm for reputation management in P2P networks[C]//Proc of the 12th International Conference on World Wide Web.[S.l.]:ACM Press,2003:640-651.
7KAMVAR S D,SCHLOSSER M T,MOLINA H G.EigenRep:reputation management in P2P networks[C]//Proc of the 12th International World Wide Web Conference.Budapest:ACM Press,2003:123-134.
8XIONG L,LIU L.A reputation-based trust model for peer-to-peer e-commerce communities[C]//Proc of IEEE Conf on E-Commerce (CEC'03).Newport Beach,California:[s.n.],2003.
9STOICA I,MORRIS R,KARGER D,et al.Chord:a scalable peer-to-peer lookup service for Internet applications[C]//Proc of the ACM SIGCOMM 2001.San Diego:[s.n.],2001.
10ABERER B.P-Grid:a self organizing access structure for P2P information systems[C]//Proc of the 6th International Conference on Cooperative Information Systems.2001:179-194.