Archive > Volume 33 Issue 10 > 2010,33(10):123-128. DOI:10.11835/j.issn.1000-582X.2010.10.021 CSTR:[cstr] Prev Next

Design and implementation of trusted network interaction pattern