1 |
J. Laneman, D. Tse, and G. Wornell, "Cooperative diversity in wireless networks: Efficient protocols and outage behavior," IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062-3080, Dec. 2004.
DOI
|
2 |
J. P. Koon, "Modelling trust in random wireless networks," in Proceedings of IEEE International Symposium on Wireless Communications Systems, pp 976-981, Aug. 2014.
|
3 |
X. Gong, X. Chen X. Gong, X. Chen, and J. Zhang, "Social group utility maximization game with applications in mobile social networks," in Proceedings of Asilomar Conference on Signals, Systems, and Computers, pp. 1496-1500, Oct. 2013.
|
4 |
J. Ryu, J. Lee, and T. Quek, "Confidential cooperative communication with trust degree of potential eavesdroppers" IEEE Transactions on Wireless Communications, vol. 15 no. 6, pp. 3823-3836, Jun. 2016.
DOI
|
5 |
J. Ryu, J. Lee, and T. Quek, "Trust degree based beamforming for MISO cooperative communication system" IEEE Communications Letters, vol. 19 no. 11, pp. 1957- 1960, Nov. 2015.
DOI
|
6 |
T. W. Ban, W. Choi, B. C. Jung, and D. K. Sung, "Multi-user diversity in a spectrum sharing system," IEEE Transactions on Wireless Communications, vol. 8, no. 1, pp. 102-106, Jan. 2009.
DOI
|
7 |
J. Li, R. Li, and J. Kato, "Future trust management framework for mobile ad hoc networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 108-114, Apr. 2008.
DOI
|
8 |
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The EigenTrust algorithm for reputation management in P2P networks," in Proceedings of World Wide Web Conference, pp. 1640-1651, May 2003.
|