共 25 条
[1]
[Anonymous], 2024, Statistical Report on Internet Development in China
[2]
[Anonymous], 2003, ARTECH H COMP SEC LI
[3]
Biryukov A, 2011, Discretionary Access Control
[4]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[6]
[杜瑞忠 Du Ruizhong], 2019, [计算机研究与发展, Journal of Computer Research and Development], V56, P2287
[7]
Goyal V., 2006, Proceedings of the 13th ACM Conference on Computer and Communications Security, P89, DOI DOI 10.1145/1180405.1180418
[8]
Hardjono T, 2019, Arxiv, DOI [arXiv:1903.04584, 10.48550/arXiv.1903.04584, DOI 10.48550/ARXIV.1903.04584]
[9]
Hu V.C., 2013, NIST SPECIAL PUBLICA, V800, P162, DOI [DOI 10.6028/NIST.SP.800-162, 10.6028/nist.sp.800-162]
[10]
A Permissioned Blockchain based Access Control System for IOT
[J].
2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019),
2019,
:469-476