Author:
Zhou Qian,Yu Jiong,Yu Feiran
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Li, H., Li, H.: The key technology and realization of trusted cloud security. Posts & Telecom press, Beijing (2010)
2. Lin, C., Peng, X.-h.: Research on trustworthy networks. Chinese Journal of Computer 28(5), 751–758 (2005)
3. Lecture Notes in Computer Science;S.S. Song,2004
4. Zhou, R.-F., Hwang, K.: Power-Trust: A robust and scalable reputation system for trusted Peer-to-Peer computing. IEEE Transactions on Parallel and Distributed Systems 18(4), 460–473 (2007)
5. Jameel, H.: A trust model for ubiquitous systems based on vectors of trust values. In: The 7th IEEE Int’1 Symp. on Multimedia, pp. 674–679. IEEE Computer Society Press, Washington (2005)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献