1[3]Josang A.Prospectives for Modeling Trust in Inforrmtion Security[A].Proceedings of the 1997 Australasian Conference on Inform&tion Security and Privacy[C].Springer,1997
2[4]Sander T,TSCHUDIN CF.Towardsmobile Cryptography[A].Security and Privacy'98,Proceedings,of Security and Privacy'98[C].1998,3~6