共 10 条
- [1] Authentication and Access Control in RFID Based Logistics-customs Clearance Service Platform[J] Hui-Fang Deng1 Wen Deng2 Han Li3 ;4 Hong-Ji Yang4 1School of Computer Science and Engineering; South China University of Technology; Guangzhou 510006; PRC 2School of Software Engineering; South China University of Technology; Guangzhou 510006; PRC 3School of Computer Science and Technology; Dalian University of Technology; Dalian 116023; PRC 4School of Computing; De Montfort University; Leicester; LE1
- [4] A Neuro-genetic Based Short-term Forecasting Framework for Network Intrusion Prediction System[J] Siva S. Sivatha Sindhu;S. Geetha;M. Marikannan;A. Kannan; International Journal of Automation & Computing 2009, 04
- [6] A Secure Short Message Communication Protocol[J] Chao-Wen Chang~(1; 2;*) Heng Pan~2 Hong-Yong Jia~2 1 School of Electronic and Information Engineering; Xi'an Jiaotong University; Xi'an 710071; PRC 2 Institute of Electronic Technology; Information Engineering University; Zhengzhou 450004; PRC International Journal of Automation & Computing 2008, 02
- [8] A Trust Model Based on Evidence Theory for P2P Systems[J] Huang Li Dong;Xue Gang;He Xiang Lin;Zhuang Hong Lin Applied Mechanics and Materials 2010,
- [9] Reputation management algorithms for DHT-based peer-to-peer environment[J] Natalya Fedotova;Luca Veltri Computer Communications 2009,
- [10] Free Riding in Peer-to-Peer Networks[J] Karakaya; Murat;Korpeoglu; Ibrahim;Ulusoy; Ozgur IEEE Internet Computing 2009,