Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference10 articles.
1. Wu, L., Ping, R., Ke, L., Hai-xin, D.: User cooperation trust model and its application in network security management. In: International Conference on Fuzzy Systems and Knowledge Discovery, pp. 2335–2339. IEEE (2011)
2. Shen, C., Zhang, D., Liu, J., Ye, H., Qiu, S.: The strategy of Tc 3.0: A revolutionary evolution in trusted computing.
https://doi.org/10.15302/J-SSCAE-2016.06.011
3. Yu, X., Jiang, G., Wang, P., Song, H., Wang, K., Liang, Y.: Research on application’s credibility verification based on ABD. Wuhan Univ. J. Nat. Sci. 21(1), 63–68 (2016)
4. Yu, X.J., & Liu, M.C.: Credibility verification of RESTful web services based on behavior declaration. In: 2nd International Conference on Computer Science and Technology (CST) (2017)
5. Wang, J., Hu, W., Zhang, Y., Chen, T., Yu, P., Zhao, B., Zhang, H.: Trusted container based on Docker. J. Wuhan Univ. (Nat. Sci. Ed.). 63(2), 102–108 (2017).
https://doi.org/10.14188/j.1671-8836.2017.02.002
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献