共 31 条
[2]
A Survey of Anonymity of Cryptocurrencies
[J].
PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2019),
2019,
[3]
Ampel B, 2019, 2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P59, DOI [10.1109/isi.2019.8823238, 10.1109/ISI.2019.8823238]
[4]
[Anonymous], 2018, Substandard and falsified medical products
[5]
Arora M., 2012, SECURE IS AES BRUTE
[6]
Averin A, 2020, 2020 INT MULT IND EN, P1
[7]
Biswas K., 2017, FUTURE TECHNOLOGIES, V2017, P56, DOI DOI 10.1007/978-3-319-54460-1_1
[8]
Bocek Thomas, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P772, DOI 10.23919/INM.2017.7987376
[9]
Caro Miguel Pincheira, 2018, 2018 IoT Vertical and Topical Summit on Agriculture - Tuscany (IOT Tuscany), DOI 10.1109/IOT-TUSCANY.2018.8373021
[10]
On Security Analysis of Proof-of-Elapsed-Time (PoET)
[J].
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2017,
2018, 10616
:282-297