共 83 条
- [1] Ahuja S.P., 2012, Network and Communication Technologies, V1, P97
- [2] Cost and benefit analysis of authentication systems [J]. DECISION SUPPORT SYSTEMS, 2011, 51 (03) : 394 - 404
- [3] Anbar Mohammed, 2011, Journal of Computer Science, V7, P1724, DOI 10.3844/jcssp.2011.1724.1728
- [4] [Anonymous], 2012, Int. J. Comput. Appl., DOI [10.5120/7470-0475, DOI 10.5120/7470-0475]
- [5] [Anonymous], 2010, PROC USENIX WORKSHOP
- [6] [Anonymous], 2013, INT J COMPUTER APPL
- [7] [Anonymous], 2013, International Journal of Engineering and Advanced Technology (IJEAT)
- [8] Bakhtiari Majid, 2014, INT J COMPUTER APPL, V90, P29
- [9] Barbu O.E., 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, P1
- [10] Network virtualization for cloud computing [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2010, 65 (11-12): : 713 - 721