[1] K Fall.A delay-tolerant network architecture for challenged Internets[J].Computer Communication Review, 2003, 33(4):27-34.
[2] K Fall, S Farrell.DTN:An architectural retrospective[J].IEEE Journal on Selected Areas in Communications, 2008, 26(5):828-836.
[3] 樊秀梅, 单志广, 张宝贤.容迟网络体系结构及其关键技术研究[J].电子学报, 2008, 36(1):161-170. Fan Xiumei, Shan Zhiguang, Zhang Baoxian.State-of-the-art architecture and techniques for delay-tolerant networks[J].Acta Electronica Sinica, 2008, 36(1):161-170.(in Chinese)
[4] Y Yoo, D P Agrawal.Why does it pay, to be selfish in a MANET[J].IEEE Wireless Communications, 2006, 13(6):87-97.
[5] S Buchegger, J Y Le Boudec.Self-policing mobile ad hoc networks by reputation systems[J].IEEE Communications Magazine, 2005, 43(7):101-107.
[6] 张洪, 段海新, 刘武.RRM:一种具有激励机制的信誉模型[J].中国科学 E辑:信息科学, 2008, 38(10):1747-1759.
[7] 吴鹏, 吴国新, 方群.一种基于概率统计方法的P2P系统信任评价模型[J].计算机研究与发展, 2008, 45(3):408-416. Wu Peng, Wu Guoxin, Fangqun.A reputation-based trust model based on probability and statistics for P2P systems[J].Journal of Computer Research and Development, 2008, 45(3):408-416.(in Chinese)
[8] H J Zhu, X D Lin, R X Lu, et al.SMART:A secure multilayer credit-based incentive scheme for delay-tolerant networks[J].IEEE Transactions on Vehicular Technology, 2009, 58(8):4628-4639.
[9] R Lu, X Lin, H Zhu, X Shen.Pi:A practical incentive protocol for delay tolerant networks[J].IEEE Transactions on Wireless Communications, 2010, 9(4):1483-1493.
[10] R Sakai, K Ohgishi, M Kasahara.Cryptosystems based on pairing[A].Symposium on Cryptography and Information Security (SCIS) 2000[C].Okinawa, Japan:ISEC of IEICE, 2000.915-921. |