Skip to main content
Fig. 4 | EURASIP Journal on Wireless Communications and Networking

Fig. 4

From: A collaborative service resource evaluation model based on trust network

Fig. 4

Security protocol of evaluation collection process. Node W's evaluation ticket of service F, including the ID of service F and W's evaluation of f. The message is encrypted with the private key of W, the evaluation ticket will be returned along the query path, and other nodes cannot forge it. The other part of the body of the response message is the proof of transaction between the nodes

Back to article page