共 29 条
[1]
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
[J].
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS,
2017,
:546-553
[2]
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[3]
Andersen Michael P, 2017, TECHNICAL REPORT
[4]
[Anonymous], ENCY CRYPTOGRAPHY SE
[5]
Decentralized trust management
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:164-173
[6]
Blaze M., 1999, The keyNote trust-management system, Version 2
[7]
Cachin C., 2016, WORKSH DISTR CRYPT C, V310
[8]
Practical byzantine fault tolerance and proactive recovery
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
2002, 20 (04)
:398-461
[9]
Frisch A., 2002, Essential System Administration, V3rd
[10]
Fromknecht C, 2014, A decentralized public [key infrastructure with identity retention