共 60 条
[1]
Abdi M.H., 2018, Comput. Inf. Sci., V11, P1, DOI [DOI 10.5539/CIS.V11N2P1, 10.5539/cis.v11n2p1]
[2]
Ahmad T., 2020, CORONA VIRUS COVID 1
[4]
Security and privacy using one-round zero-knowledge proofs
[J].
CEC 2005: SEVENTH IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS,
2005,
:435-438
[5]
Andergassen M, 2015, PROCEEDINGS OF 2015 INTERNATIONAL CONFERENCE ON INTERACTIVE COLLABORATIVE LEARNING (ICL), P779, DOI 10.1109/ICL.2015.7318127
[6]
Borisov N., 2010, INF SEC CRYPT ICISC
[7]
Humor and Stereotypes in Computing: An Equity-focused Approach to Institutional Accountability
[J].
COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING AND WORK PRACTICES,
2022, 31 (04)
:771-803
[8]
Cluster Heads Election Analysis for Multi-hop Wireless Sensor Networks Based on Weighted Graph and Particle Swarm Optimization
[J].
ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 7, PROCEEDINGS,
2008,
:599-+
[10]
Cyberattacks and threats during COVID-19: A systematic literature review
[J].
SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT,
2021, 23 (01)