Fig. 8From: Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networksIndirect trust calculationBack to article page