Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Liang Chen, Kan Chen, Chengcheng Shao, Peidong Zhu |
SocAware: A Middleware for Social Applications in Online Social Networks. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Baden Delamore, Ryan K. L. Ko |
Escrow: A Large-Scale Web Vulnerability Assessment Tool. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yong Ho Hwang, Jae Woo Seo, Il Joo Kim |
Encrypted Keyword Search Mechanism Based on Bitmap Index for Personal Storage Services. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guorui Li, Ying Liu, Ying Wang 0033 |
Analysis of the Count-Min Sketch Based Anomaly Detection Scheme in WSN. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wenjuan Li 0001, Weizhi Meng 0001, Zhiyuan Tan 0001, Yang Xiang 0001 |
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weixi Gu, Zheng Yang 0002, Longfei Shangguan, Xiaoyu Ji, Yiyang Zhao |
ToAuth: Towards Automatic Near Field Authentication for Smartphones. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bin Zhou, Hai Jin 0001, Ran Zheng |
A High Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jianwei Ding, Yingbo Liu, Li Zhang 0065, Jianmin Wang 0001 |
MapReduce for Large-Scale Monitor Data Analyses. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Md. Sadek Ferdous, Ron Poet |
CAFS: A Framework for Context-Aware Federated Services. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhenwei Zhao, Guoqiang Bai 0001 |
Ultra High-Speed SM2 ASIC Implementation. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tianyong Ao, Zhangqing He, Jinli Rao, Kui Dai, Xuecheng Zou |
A Compact Hardware Implementation of SM3 Hash Function. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chun-Yu Wang, Tzu-Li Tai, Kuan-Chieh Huang, Tse-En Liu, Jyh-Biau Chang, Ce-Kuen Shieh |
FedLoop: Looping on Federated MapReduce. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ya Tan, Jizeng Wei, Wei Guo 0005 |
The Micro-architectural Support Countermeasures against the Branch Prediction Analysis Attack. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xuerui Pan, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang |
Defensor: Lightweight and Efficient Security-Enhanced Framework for Android. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yu Bai 0010, Gang Yin, Huaimin Wang |
Multi-dimensions of Developer Trustworthiness Assessment in OSS Community. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Frank Zhigang Wang, Theo Dimitrakos, Na Helian, Sining Wu, Yuhui Deng, Ling Li, Rodric Yates |
Data Interface All-iN-A-Place (DIANA) for Big Data. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weiß, Steffen Wagner, Roland Hellman, Sascha Wessel |
Integrity Verification and Secure Loading of Remote Binaries for Microkernel-Based Runtime Environments. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fábio Borges, Leonardo A. Martucci, Filipe Beato, Max Mühlhäuser |
Secure and Privacy-Friendly Public Key Generation and Certification. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuanlong Cao, Jianfeng Guan, Changqiao Xu, Wei Quan 0001, Hongke Zhang |
Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shenglong Ding, Yiming Zhao, Yuyang Liu |
Efficient Traceable Attribute-Based Signature. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shuai Zhao, Xiaohong Li 0001, Guangquan Xu, Lei Zhang, Zhiyong Feng 0002 |
Attack Tree Based Android Malware Detection with Hybrid Analysis. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhangxuan Luo, Guoyan Xu |
Research of Provenance Storage in Cloud Computing Environment. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Byungho Min, Vijay Varadharajan |
Design and Analysis of a New Feature-Distributed Malware. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yingxu Wang 0001, Victor J. Wiebe |
Big Data Analyses for Collective Opinion Elicitation in Social Networks. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hongfeng Chai, Zhijun Lu, Qingyang Meng, Jun Wang, Xiubang Zhang, Zhijian Zhang |
TEEI - A Mobile Security Infrastructure for TEE Integration. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan |
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad A. Kardan, Reza Salarmehr, Azade Farshad |
SigmoRep: A Robust Reputation Model for Open Collaborative Environments. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hui Xia 0001, Jia Yu 0005, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan 0001 |
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ximing Fu, Zhiqing Xiao, Shenghao Yang 0001 |
Overhead-Free In-Place Recovery Scheme for XOR-Based Storage Codes. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mamoona Naveed Asghar, Mohammad Ghanbari 0001, Martin J. Reed |
Sufficient Encryption with Codewords and Bin-strings of H.264/SVC. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ismail San, Nuray At |
On Increasing the Computational Efficiency of Long Integer Multiplication on FPGA. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Graeme Horsman, Christopher Laing, Paul Vickers |
A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic Investigations. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodong Li, Hong Zhang |
Research on Cooperative Learning of Digital English Writing in Network Environment. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | M. Ajmal Azad, Ricardo Morla |
Mitigating SPIT with Social Strength. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jiyoung Kang |
AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented Reality. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Bilal 0012, M. O. Hussain, Pauline M. L. Chan |
A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Subhash Sagar, Nadeem Javaid, Zahoor Ali Khan, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk |
Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Naruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo |
A Practical Network-Based Intrusion Detection and Prevention System. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Uthman Baroudi, Anas Al-Roubaiey, Samir Mekid, Abdelhafid Bouhraoua |
The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive Study. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber 0001 |
Ginger: An Access Control Framework for Telematics Applications. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jesse Leskinen |
Evaluation Criteria for Future Identity Management. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanat Kumar Bista, Surya Nepal, Cécile Paris |
Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jun Ishii, Hiroyuki Maeomichi, Ikuo Yoda |
Privacy-Preserving Statistical Analysis Method for Real-World Data. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman |
Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating System. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia |
Reputation Diffusion Simulation for Avoiding Privacy Violation. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen |
A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNs. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc |
Tracking of Data Leaving the Cloud. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ying Kong, Yuqing Zhang 0001, Zhejun Fang, Qixu Liu |
Static Detection of Logic Vulnerabilities in Java Web Applications. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah 0001 |
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Stimpson, Lu Liu 0001, Yongzhao Zhan |
An Investigation into the Evolution of Security Usage in Home Wireless Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yongji Yu, Zhiping Jia, Ruihua Zhang |
Prediction-Based Algorithm for Event Detection in Wireless Sensor Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arshad Jhumka, Matthew Bradbury, Matthew Leeke |
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexander V. Uskov |
Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Martin Peters, Christopher Brink, Sabine Sachweh |
Including Metadata into an Ontology Based Pervasive Computing Architecture. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith 0001 |
Confidentiality as a Service - Usable Security for the Cloud. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guicheng Shen, Bingwu Liu |
Research on Embedding ECC into RFID Authentication Protocol. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yue Li, Dehua Chen, Thomas Newe |
Formal Verification of a Key Agreement Protocol for Wireless Sensor Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sheu M. A. Mavee, Elizabeth Marie Ehlers |
A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power Grid. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Guoyan Zhang, Lei Liu, Yang Liu |
An Attribute-Based Encryption Scheme Secure against Malicious KGC. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge |
A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an Example. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Haibin Zhang, Yan Wang 0002, Xiuzhen Zhang 0001 |
Efficient Contextual Transaction Trust Computation in E-commerce Environments. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yong Wang 0028, Ting-Ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng |
Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Pai, Sasi Inguva, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal |
Padati: A Robust Pedestrian Dead Reckoning System on Smartphones. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao 0003, Baohui Wang, Jianhua Ma |
Evolution of Cooperation Based on Reputation on Dynamical Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang |
Offline RFID Grouping Proofs with Trusted Timestamps. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li 0001 |
Discovering a Large Scale Internet Topology: Complementary and Contrast View. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jin Huang, Zhexin Xu, Weikai Xu, Lin Wang 0003 |
Error Performance Analysis of Opportunistic Relaying System Based on DCSK. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. Nayyef, Charalampos Tsimenidis, Arafat Al-Dweik, Bayan S. Sharif, Ali Hazmi |
Time- and Frequency-Domain Impulsive Noise Spreader for OFDM Systems. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002 |
Ring Group Signatures. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Murat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi |
Using Subjective Logic to Handle Uncertainty and Conflicts. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Haichang Gao, Wei Wang, Ye Fan |
Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Khodor Hamandi, Farah Saab, Ayman I. Kayssi |
Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhichun Wang, Rongfang Bie, Mingquan Zhou |
Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoT. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen |
RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xuan Huang 0003, Geoffrey Lund, Andrew Sapeluk |
Development of a Typing Behaviour Recognition Mechanism on Android. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Natasa Zivic |
Security Aspects of Soft Verified Messages Protected by Message Authentication Codes. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hui Lin 0007, Jia Hu 0001, Atulya Nagar, Li Xu 0002 |
Role Based Privacy-Aware Secure Routing in WMNs. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Qijun Gu, Wanyu Zang, Meng Yu 0001, Peng Liu 0005 |
Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rennie Archibald, Dipak Ghosal |
A Covert Timing Channel Based on Fountain Codes. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
A Privacy Preserving Application Acquisition Protocol. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fan Xu, Shen Li, Zhiying Wang 0003 |
HVD-TLS: A Novel Framework of Thread Level Speculation. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoud Hashem Eiza, Qiang Ni |
A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on Highways. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xue Chen, Chao Wu |
A Text Representation Method Based on Harmonic Series. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Cunqing Ma, Jingqiang Lin, Yuewu Wang |
Efficient Missing Tag Detection in a Large RFID System. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma |
Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Su Chen, Yi Chen 0018, Hai Jiang 0003, Laurence Tianruo Yang, Kuan-Ching Li |
A Secure Distributed File System Based on Revised Blakley's Secret Sharing Scheme. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Bashir Abdullahi, Guojun Wang 0001 |
A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Quang-Anh Tran, Frank Jiang 0001, Jiankun Hu |
A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Restricted Identification without Group Keys. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ismail Mansour, Gérard Chalhoub, Bassem Bakhache |
Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Diogo Lima, Hugo Miranda |
Flow-Aware Broadcasting Algorithm. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Areno, Jim Plusquellic |
Securing Trusted Execution Environments with PUF Generated Secret Keys. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Menghui Yang, Yongzhong Zou, Li Fang |
Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS Reception. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | René Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle |
SEAMS: A Signaling Layer for End-Host-Assisted Middlebox Services. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Udaya Kiran Tupakula |
TREASURE: Trust Enhanced Security for Cloud Environments. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Minoru Nakayama, Masashi Fujimoto |
Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual Stimuli. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jehad Al-Sadi |
The Load Balancing Problem in Extended OTIS-n-Cube Interconnection Networks. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0008, Zheng Yan 0002 |
Gemini: A Handbag for Pervasive Social Communications. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fei Wang 0007, Xiaofeng Wang 0002, Jinshu Su, Bin Xiao 0001 |
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tom Kirkham, Django Armstrong, Karim Djemame, Marcelo Corrales, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó |
Assuring Data Privacy in Cloud Transformations. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|