

Author: Swan William McDermott Peter Khalfan Malik
Publisher: Inderscience Publishers
ISSN: 1470-9503
Source: International Journal of Networking and Virtual Organisations, Vol.4, Iss.4, 2007-11, pp. : 369-382
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Adaptive trust-based anonymous network
By Sakarindr Pitipatana Ansari Nirwan
International Journal of Security and Networks, Vol. 2, Iss. 1-2, 2007-03 ,pp. :





