共 25 条
[1]
A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
1993, 15 (04)
:706-734
[2]
Aggarwal Charu C, 2008, A general survey of privacy-preserving data mining models and algorithms
[3]
Routing through the mist: Privacy preserving communication in ubiquitous computing environments
[J].
22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2002,
:74-83
[4]
[Anonymous], 2016, Wired
[5]
[Anonymous], 2014, Forbes
[6]
[Anonymous], 2015, Reuters
[7]
Blackhurst Michael, 2010, IEEE International Symposium on Sustainable Systems and Technology (ISSST 2010), DOI 10.1109/ISSST.2010.5507759
[8]
Buterin V., 2014, NEXT GENERATION SMAR, DOI DOI 10.1145/2939672.2939785
[9]
Campbell Russ., 2003, HERITAGE LANGUAGE J, V1, P91
[10]
Internet of Things (IoT): A vision, architectural elements, and future directions
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (07)
:1645-1660