1.
Younis YS, Abed Hamed SH, Meften S. Models of Trust and Trusted Computations to an Ad-hoc Network Security. J. Al-Qadisiyah Comp. Sci. Math. [Internet]. 2022 Dec. 2 [cited 2024 Nov. 13];14(4):Comp Page 92-100. Available from: https://jqcsm.qu.edu.iq/index.php/journalcm/article/view/1090