//-->
The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bayliss, Christopher, (2011)
Digital identity management : perspectives on the technological, business and social implications
Birch, David G. W., (2007)
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K., (2008)
Research on strategic architecture of collaborative business system
Mi, Zhiwei, (2006)
Knowledge enterprise: intelligent strategies in product design, manufacturing, and management : proceedings of PROLAMAT 2006, IFIP TC5 international conference, June 15-17 2006, Shanghai, China
Wang, Kesheng, (2006)