@inbook{7dc390a0a8464a8da00ff8314d97d33f,
title = "Recommendation-based trustworthy service evaluation",
keywords = "Malicious user, Real identity, Sybil attack, Time slot, User cooperation",
author = "Xiaohui Liang and Rongxing Lu and Xiaodong Lin and Shen, \{Xuemin Sherman\}",
note = "Publisher Copyright: {\textcopyright} The Author(s) 2013.",
year = "2013",
doi = "10.1007/978-1-4614-8857-6\_4",
language = "English",
series = "SpringerBriefs in Computer Science",
publisher = "Springer",
number = "9781461488569",
pages = "67--93",
booktitle = "SpringerBriefs in Computer Science",
edition = "9781461488569",
}