共 44 条
[1]
Abdullah A., 2017, Cryptogr. Netw. Secur., V16, P11
[2]
Characteristics of Blockchain and Its Relationship With Trust
[J].
IEEE ACCESS,
2023, 11
:15364-15374
[3]
Pham A, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1235
[4]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[5]
Broder A. Z., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P327, DOI 10.1145/276698.276781
[6]
DID and VC: Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust
[J].
2020 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2020,
2020,
:61-66
[7]
Buterin, 2013, ETHEREUM WHITE PAPER
[8]
Canivel R.S.C., Uber PH Confirms Data of Filipino Users among Those HackedNPC
[9]
Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258