[1]
Y. S. Younis, S. H. Abed Hamed, and S. Meften, “Models of Trust and Trusted Computations to an Ad-hoc Network Security”, J. Al-Qadisiyah Comp. Sci. Math., vol. 14, no. 4, pp. Comp Page 92–100, Dec. 2022.