共 62 条
[11]
Camenisch J, 2002, LECT NOTES COMPUT SC, V2442, P61
[12]
CAMENISCH J, 2002, P 9 ACM C COMP COMM, P21, DOI DOI 10.1145/586110.586114
[13]
Derler David, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P127, DOI 10.1007/978-3-319-16715-2_7
[14]
Diebold Z., 2017, SELF SOVEREIGN IDENT
[15]
Ethereum Foundation, 2023, WEB3PY
[16]
A Comprehensive Formal Security Analysis of OAuth 2.0
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1204-1215
[17]
Gao WC, 2018, 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN)
[18]
GitHub, 2019, IMPLEMENTATION ELLIP
[20]
Ingram David, 2018, Reuters