共 182 条
- [21] Banaeian Far S., Asaar M.R., Haghbin A., Distributed auditing protocol for untraceable transactions, J. Inf. Secur. Appl., 73, 100, pp. 1-14, (2023)
- [22] Bao Z., He D., Khan M.K., Luo M., Xie Q., PBidm: Privacy-preserving blockchain-based identity management system for industrial internet of things, IEEE Trans. Ind. Inform., 19, 2, pp. 1524-1534, (2023)
- [23] Barker S., Sergot M.J., Wijesekera D., Status-based access control, ACM Trans. Inf. Syst. Secur., 12, 1, pp. 1-47, (2008)
- [24] Beigi G., Liu H., A survey on privacy in social media: Identification, mitigation, and applications, ACM/ IMS Trans. Data Sci., 1, 1, pp. 1-38, (2020)
- [25] Belchior R., Riley L., Hardjono T., Vasconcelos A., Correia M., Do you need a distributed ledger technology interoperability solution?, Distrib. Ledger Technol., 2, 1, pp. 1-37, (2023)
- [26] Bella G., Giustolisi R., Riccobene S., Enforcing privacy in e-commerce by balancing anonymity and trust, Comput. Secur., 30, 8, pp. 705-718, (2011)
- [27] Ben-Sasson E., Bentov I., Horesh Y., Riabzev M., Scalable, transparent, and post-quantum secure computational integrity, pp. 1-46, (2018)
- [28] Ben-Shahar O., Data pollution, J. Leg. Anal., 11, pp. 104-159, (2019)
- [29] Benomar Z., Longo F., Merlino G., Puliafito A., Cloud-based enabling mechanisms for container deployment and migration at the network edge, ACM Trans. Internet Technol., 20, 3, pp. 1-28, (2020)
- [30] Berke A., Calacci D., Privacy limitations of interest-based advertising on the web: A post-mortem empirical analysis of google's floc, Proc. of the ACM SIGSAC Conf. on Computer and Commun. Security, CCS, pp. 337-349, (2022)