相似文献/References:
[1]童岚岚 刘连忠.基于动态联盟的一种身份信任计算模型[J].计算机技术与发展,2010,(02):152.
TONG Lan-lan,LIU Lian-zhong.One of Arithmetic Models of Identity Trust Management Based on Dynamic Federation[J].,2010,(12):152.
[2]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(12):159.
[3]石磊 罗永龙 张彩云.随机化算法及其在最小外接圆求解中的应用[J].计算机技术与发展,2009,(08):82.
SHI Lei,LUO Yong-long,ZHANG Cai-yun.Randomized Algorithm and Its Application in Finding Minimum Circumscribed Circle[J].,2009,(12):82.
[4]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(12):102.
[5]周伟 许峰 韦琳.基于云模型的电子商务信任机制的研究[J].计算机技术与发展,2011,(03):165.
ZHOU Wei,XU Feng,WEI Lin.Research on Trust Mechanism for E-Commerce Based on Cloud Model[J].,2011,(12):165.
[6]赵玉 易磊.空间几何对象相对位置的新安全判定方法[J].计算机技术与发展,2011,(05):103.
ZHAO Yu,YI Lei.A New Secure Method for Determining Two Spatial Geometric Objects Related Position[J].,2011,(12):103.
[7]陈伟 解争龙 弋改珍.P2P网络中蚁群的声誉信息分发算法研究[J].计算机技术与发展,2011,(12):124.
CHEN Wei,XIE Zheng-long,YI Gai-zhen.Research of Reputation-Ant Distribution Algorithm in P2P Networks[J].,2011,(12):124.
[8]陈珊珊.基于信任的节点邻居动态配置的P2P拓扑构建[J].计算机技术与发展,2013,(10):64.
CHEN Shan-shan.P2P Topology Construction Based on Neighbor Dynamic Configuration of Trust[J].,2013,(12):64.
[9]杨晓莉,左祥建. 一种基于二次剩余的抛掷硬币方案[J].计算机技术与发展,2016,26(09):139.
YANG Xiao-li,ZUO Xiang-jian. A Coin Toss Protocol Based on Quadratic Residue[J].,2016,26(12):139.
[10]杨晓艺,刘新,亢佳. 点包含问题的安全多方计算[J].计算机技术与发展,2017,27(05):120.
YANG Xiao-yi,LIU Xin,KANG Jia. Secure Multi-party Computation for Point Inclusion Problems[J].,2017,27(12):120.