共 30 条
[1]
[Anonymous], 1996, TRUST ORG FRONTIERS
[2]
Applegate L.M., 1996, J ORG COMPUTING ELEC, V6, P1, DOI DOI 10.1080/10919399609540264
[3]
BEQUAI A, 1996, COMPUTER AUDIT U JUL, P28
[4]
BERNSTEIN T, 1996, INTERNET SECURITY BU, P23
[6]
CAELLI WJ, 1997, PACIS 97 PAC AS C IN, P1
[7]
Clarke R., 1997, PROMISES THREATS ELE
[8]
Cummings L.L., 1996, Trust in organizations, P302, DOI DOI 10.4135/9781452243610.N15
[9]
DEUTCH M, 1960, HUM RELAT, P123
[10]
NEW DIRECTIONS IN CRYPTOGRAPHY
[J].
IEEE TRANSACTIONS ON INFORMATION THEORY,
1976, 22 (06)
:644-654