Fig. 21From: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networksRevocation timeBack to article page