共 11 条
[1]
Beth T., 1994, VALUATION TRUST OPEN
[2]
Dengke Yuan, 2010, 2010 International Conference on E-Business and E-Government (ICEE 2010), P2006, DOI 10.1109/ICEE.2010.507
[4]
Jarvenpaa SL., 1999, J COMPUT-MEDIAT COMM, V5, P0, DOI [10.1111/j.1083-6101.1999.tb00337.x, DOI 10.1111/J.1083-6101.1999.TB00337.X]
[5]
Josang Audun., 1999, Proceedings of the Fourth Nordic Workshop on Secure Computer Systems (NORDSEC'99), P496
[7]
Lim Weng Marc, 2014, Journal of Computer Information Systems, V54, P87
[8]
Liu XN, 2011, 2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), P385, DOI 10.1109/ICBNMT.2011.6155962
[10]
Wang Y., 2004, INTERACTION TRUST EV, P144