共 41 条
[1]
Abbadi Imad M., 2011, Information Security Technical Report, V16, P108, DOI 10.1016/j.istr.2011.08.006
[2]
[Anonymous], 2014, INT C CRYPT SEC SYST
[3]
Barker S., 2012, SustKDD, V111, P108
[4]
Biswas K, 2016, PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS
[5]
IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY
[6]
IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), P1392, DOI [10.1109/HPCC-SmartCity-DSS.2016.0198, 10.1109/HPCC-SmartCity-DSS.2016.178]
[7]
Bonomi F., 2012, P 1 MCC WORKSH MOB C, P13, DOI [10.1145/2342509.2342513, DOI 10.1145/2342509.2342513]
[8]
Carminati B., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P988, DOI 10.1109/PASSAT/SocialCom.2011.69
[9]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461