Computer Science ›› 2013, Vol. 40 ›› Issue (Z6): 334-336.
Previous Articles Next Articles
SUN Bo,DING Xue-feng,SI Cheng-xiang and ZHANG Wei
[1] Kamvar S D,Schlosser M T,GarciaMolina H.The enginetrust algorithm for reputation manegement in P2P networks[C]∥Proc.of 12th Intl.Conf.on World Wide Web(WWW2003).New york:Springer-Verlag,2003:344-51 [2] Xiong L,Liu L.Supporting reputation-based trust in peer-tp-peer communities[J].IEEE transaction on knowledge and data engineering,2004,12(7):843-857 [3] Pederson T.Non-interactive and information secure verifiablesecret sharing[C]∥Proc.of Advances in Cryptology-Crypto’91.New york:Springer-Verlag,1991:129-140 [4] Resnick P,Zeckhauser R.Trust among strangers in internettransactions[J].The economics of the internet and e-commerce,2002,11:127-157 [5] Shamir A.How to share a secret[C]∥Communications of ACM 22,1979.New york:Springer-Verlag,1979:612-613 [6] Chor B,Goldwasser S,Micali S,et al.verifiable secret sharingandachieving simultaneity in the presence of faults[C]∥Proc.of the 26th Annual symposium on foundation of computer science,1985.New york:Springer-Verlag,1985:383-395 [7] Mao Wen-bo.Modern cryptography:Theory and Practice[M].Prentice Hall PTR,2003:514-590 |
No related articles found! |
|