Author of the publication

Trusted Transmission Protocol for Content Security.

, , and . ICYCS, page 1951-1956. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis Method of Energy for C Source Program and Its Application., , , and . GreenCom/iThings/CPScom, page 1397-1402. IEEE, (2013)Adaptation of Mismatching Services Based on Labelled Interface Automata., and . SKG, page 326-329. IEEE Computer Society, (2009)Trusted Dynamic Scheduling for Large-Scale Parallel Distributed Systems., and . ICPP Workshops, page 137-144. IEEE Computer Society, (2011)Trusted Transmission Protocol for Content Security., , and . ICYCS, page 1951-1956. IEEE Computer Society, (2008)Validity Checking On Grid Service Composition., and . COMPSAC (1), page 379-382. IEEE Computer Society, (2007)A Semantic Reputation Mechanism in P2P Semantic Web., , and . ASWC, volume 4185 of Lecture Notes in Computer Science, page 682-688. Springer, (2006)Software Evolution Rules with Condition Constrains to Support Component Type Matching Based on Bigraph., , and . International Journal of Software Engineering and Knowledge Engineering, 28 (10): 1429-1453 (2018)An evidence-based iterative content trust algorithm for the credibility of online news., and . Concurrency and Computation: Practice and Experience, 21 (15): 1857-1881 (2009)A Grid Resource Price-adjusting Strategy Based on Price Influence Model., , and . GCC, page 311-318. IEEE Computer Society, (2006)Interest-driven Reasoning Based on Commitment Alternating Temporal Logic in the P2P Reputation System., , and . JCP, 5 (12): 1942-1950 (2010)