Fig. 12From: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networksSize of clusterBack to article page