Fig. 3From: An active and verifiable trust evaluation approach for edge computingIllustration of AVTE schemeBack to article page