Fig. 3From: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networksIndirect trustBack to article page