Publisher
Springer Science and Business Media LLC
Reference18 articles.
1. Ian F, Carl K, Steve T. The Anatomy of the Grid: Enabling Scalable Virtual Organizations[J].International Journal of Supercomputer Applications, 2001,15(3):200–222.
2. Foster I, Kesselman C, Tsudik G,et al. A Security Architecture for Computational Grids [C]//Proceedings of the 5th ACM conference on computer and communications security. New York: ACM Press, 1998:83–91.
3. Wang H, Duan F. Isolation Technique and Application [J].Computer development and application, 2002,2:4–6.
4. David P. Strong Password-Only Authenticated Key Exchange [J].Computer Communication Review, 1996,26(5):5–26.
5. Diffie W, Hellman M. New Directions in Cryptography [J].IEEE Transactions on Information Theory 1976,11:644–654.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献