Author: Li Jiangtao
Publisher: Springer Publishing Company
ISSN: 1615-5262
Source: International Journal of Information Security (IJIS), Vol.8, Iss.2, 2009-04, pp. : 89-101
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
A generic decentralized trust management framework
SOFTWARE:PRACTICE AND EXPERIENCE, Vol. 45, Iss. 4, 2015-04 ,pp. :
Securing wireless mobile nodes from distributed denial‐of‐service attacks
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 1532-0626, Iss. 15, 2015-10 ,pp. :