共 19 条
[1]
Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
[2]
Chen Xu-ri, 2008, Journal of Hunan University (Natural Science), V35, P85
[3]
Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
[4]
Grandison T., 2000, SURVEY TRUST INTERNE
[5]
Jia Dongyan, 2013, J SOFTW, V8, P1
[6]
Jincui C., 2011, ENERGY PROCEDIA, V13, P1056
[8]
Kapadia Apu, 2000, UIUCDCSR2000 IRBAC
[9]
Lang Bo, 2010, J COMMUNICATIONS
[10]
Liangmin Guo, 2013, Journal of Software, V8, P357, DOI 10.4304/jsw.8.2.357-360