Trusted Service Application Framework on Mobile Network
暂无分享,去创建一个
Tao Wang | Zhengquan Xu | Xin Gu | Yilin Fang
[1] Liu Jin. Review of cloud based trust model , 2011 .
[2] Amitava Datta,et al. Dependable Dynamic Source Routing without a Trusted Third Party , 2005, ACSC.
[3] Zeng Qing. An Evaluation Method for Trusted Channel Based on Protocol Analysis , 2006 .
[4] Chuang Lin,et al. Research on Network Architecture with Trustworthiness and Controllability , 2006, Journal of Computer Science and Technology.
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[6] Li Qinghua and Zhao Feng. The PBL Method: A Novel Parallel Error Detection Method for Intrusion Tolerance Systems , 2006 .
[7] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[8] Liu Jin. The Research of Trusted Service System on Mobile WiMAX , 2012 .
[9] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[10] Feng Zhou,et al. A multi-dimensional trust evaluation model for large-scale P2P computing , 2011, J. Parallel Distributed Comput..
[11] Guo Chang. Fault-Tolerant Mechanism Basing on Corba Messaging , 2002 .