共 45 条
[1]
Ahn Gail-Joon., 2005, Digital Identity Management, P28
[2]
Al Hassanieh L, 2018, 2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), P165
[4]
Andow B, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P985
[5]
[Anonymous], 2013, INT J SECUR 1 TRUST, DOI DOI 10.5121/IJSPTM.2013.2402
[6]
Asghar MuhammadEhtisham., 2018, P 28 INT TEL NETW AP, P1, DOI [DOI 10.1109/ATNAC.2018.8615224, DOI 10.1109/ICC.2018.8422732]
[7]
Barakat, 2021, ACM T INTERNET TECHN
[9]
Design and Implementation of a CBR-based Privacy Agent
[J].
2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES),
2012,
:317-326
[10]
Chairani M., 2019, ARXIV191105798