3RESNICKAND P, ZESNICKAND R, FRIENMAN E. Reputation systems [ J ]. Communications of the ACM, 2000, 43(12) : 54 -48.
4SONG Y, FILLIA M, JAMES F. Collaborative automated trust negotiation in peer-to-peer systems [ C ]//Proceedings of the Fourth International Conference on Peer-to-Peer Computing. Los Alamitos, Calif: IEEE Computer Society, 2004 : 108 - 115.
5LI X, LING L. Peer trust: Supporting reputation-based trust for Peer-to-Peer electronic communities [ J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7) :843 -857.
6WU T, MALKIN M, BONEH D. Building intrusion-tolerant application [ C 1//Proceedings of the USENIX Security Symposium. Berkeley, CA: USENIX Associa- tion, 1999:79-91.
7SHOUP V. Practical threshold signatures [ C ]//Preneel, Bart. Proceedings of the Eurocrypt 2000. Bruges (Brugge) : Springer-Verlag, 2000 : 207 - 220.
8[美]Wadlow T A,网络安全与实施方法,北京:人民邮电出版社,2001.
9Hahm Seongil, Jung Yongjae, Yi Seunghee, et al. A self-organized authentication architecture in mobile ad-hoc networks. International Conference on Information Networking. Jeju Island, South Korea, 2005 ;3391:689-696.
10Gokhale S, Dasgupta P. Distributed authentication for peer-to-peer networks. Applications and the Internet Workshops. Orlando, FL, USA, 2003 : 347 -353.