GUO Weia,LU Hongb. Research on the Mechanism of Trusted Routingfor Mobile Ad Hoc Networks[J]. Journal of Jianghan University(Natural Science Edition), 2012, 40(1): 68-73.
[1]Urpi A, Bonuccelli M, Giordano S.Modeling cooperation in mobile ad hoc networks a formal description of selfishness.Proc.of the Int’l Symp.on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks 单位 WiOPT 2003)[EB/OL].单位 2003).ftp//ftp-sop.inria.fr/maestro/WiOpt03PDFfiles/urpi10.pdf. [2]Marti S,Giuli T, Lai K.Mitigating routing misbehavior in mobile ad hoc networks[C]//Proc.of the ACM MobiCom 2000.New YorkACM Press,2000255-265. [3]Srinivasan A,Teitelbaum J,Liang H,et al.Reputation and trust-based systems for Ad Hoc and Sensor Networks.Accepted for publication in algorithms and protocols for Wireless Ad Hoc and Sensor Networks, Wiley & Sons[EB/OL].单位 2008).http//www.cse.fau.edu/~jie/research/publications/Publication_files/trust.pdf. [4]Buchegger S, Boudec J L.Performance analysis of the CONFIDANT protocol[C]//Proceedings of the Third ACM International Conference on Mobile Computing and Networking,2002226-236. [5]Michiardi P,Molva R.COREA collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks[C]//Proceedings of the Sixth IFIP Conf.on Communications and Multimedia Security,Portoroz,2002107-121. [6]Hu Y C,Perrig A,Johnson D B.Rushing attacks and defense in Wireless Ad Hoc Network Routing Protocols[C]//Proceedings of the 2003 ACM Workshop on Wireless Security 单位 WiSe 2003),200330-40. [7]McKnight D H, Cummings L L, Chervany N L.Initial trust formation in new organization relationships[J].Acadamy of Management Review,1998,23单位 3)473-490. [8]Provey D.Developing electronic trust policies using a risk management model[C]//Proceedings of the 1999 CQRE Congress, 19991-16.
JIANG Yi-qiang, YANG Shao-wei, HUANG Sui, YANG Jin-yuan, ZHANG Sui.
Application of PACS System in Radiology
[J]. Journal of Jianghan University(Natural Science Edition), 2011, 39(2): 88-90.