Deng Yun-kai, Zheng Yuan, Hu Ying-hui. Analysis of Synthetic Aperture Radar Repeater Jamming[J]. Journal of Electronics & Information Technology, 2010, 32(1): 69-74. doi: 10.3724/SP.J.1146.2008.01636
Citation:
|
Xie Xiao-Lan, Liu Liang, Zhao Peng. Trust Model Based on Double Incentive and Deception Detection for Cloud Computing[J]. Journal of Electronics & Information Technology, 2012, 34(4): 812-817. doi: 10.3724/SP.J.1146.2011.00787
|
Deng Yun-kai, Zheng Yuan, Hu Ying-hui. Analysis of Synthetic Aperture Radar Repeater Jamming[J]. Journal of Electronics & Information Technology, 2010, 32(1): 69-74. doi: 10.3724/SP.J.1146.2008.01636
Citation:
|
Xie Xiao-Lan, Liu Liang, Zhao Peng. Trust Model Based on Double Incentive and Deception Detection for Cloud Computing[J]. Journal of Electronics & Information Technology, 2012, 34(4): 812-817. doi: 10.3724/SP.J.1146.2011.00787
|
Trust Model Based on Double Incentive and Deception Detection for Cloud Computing
- Received Date: 2011-07-29
- Rev Recd Date:
2011-12-26
- Publish Date:
2012-04-19