共 23 条
[1]
Ahmad R. W., 2017, INT J COMMUN SYST, V30
[2]
Alhamad Mohammed, 2010, Proceedings of the 13th International Conference on Network-Based Information Systems (NBiS 2010), P321, DOI 10.1109/NBiS.2010.67
[3]
[Anonymous], 2015, 1188912015E ISOIEC
[4]
Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
[5]
Decentralized trust management
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:164-173
[6]
A trust-based service evaluation and selection model in pervasive computing environment
[J].
2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS,
2006,
:641-+
[7]
Hunt FY, 2011, IEEE INTL CONF CONTR, P1131, DOI 10.1109/CCA.2011.6044422
[9]
Jianbin Wu, 2010, Proceedings of the 2010 IEEE International Conference on Granular Computing (GrC-2010), P525, DOI 10.1109/GrC.2010.19