共 39 条
- [1] Ahmad K., 2019, RECENT PATENTS ENG, V13, P5, DOI 10.2174/1872212112666180731114714
- [2] Aleksandrova E.B., 2021, SPRINGER CCIS VOLUME
- [3] [Anonymous], COST DAT BREACH REP
- [5] Baird L., 2016, Swirlds Tech Report Swirlds-Tr-2016-01, P1
- [6] Bertoni G., 2011, THE KECCAK REFERENCE
- [7] A Smart-Farming Ontology for Attribute Based Access Control [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 29 - 34
- [8] Dinesh G., 2021, RECENT ADV COMPUT SC, V14, P1506, DOI [10.2174/266625581405210129162256, DOI 10.2174/266625581405210129162256]
- [9] Dworkin M., 2015, SHA 3 STANDARD PERMU, DOI [10.6028/NIST.FIPS.202, DOI 10.6028/NIST.FIPS.202]
- [10] The secure Three-Tier Architecture pattern [J]. CISIS 2008: THE SECOND INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2008, : 555 - 560