Figure 3From: A security authentication method based on trust evaluation in VANETs The correlation coefficient of trust vector. Back to article page