共 24 条
[1]
[Anonymous], 2013, NAN HDB
[2]
Bao ZW, 2009, PROC INT CONF DATA, P808, DOI 10.1109/ICDE.2009.103
[3]
Dai Chao-fan, 2010, Application Research of Computers, V27, P3215, DOI 10.3969/j.issn.1001-3695.2010.09.004
[4]
Taxonomy and analysis of security protocols for Internet of Things
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 89
:110-125
[5]
Karvounarakis G., 2010, SIGMOD, P951
[7]
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems
[J].
IEEE ACCESS,
2018, 6
:28203-28212
[9]
Digital Continuity Guarantee Approach of Electronic Record Based on Data Quality Theory
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2020, 63 (03)
:1471-1483