共 50 条
- [41] Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing IEEE ACCESS, 2019, 7 : 169636 - 169645
- [42] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations International Journal of Information Security, 2016, 15 : 519 - 537
- [44] Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 33 - 50
- [45] Decentralized Identifiers and Verifiable Credentials for Smartphone Anticounterfeiting and Decentralized IMEI Database CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2020, 43 (03): : 174 - 180
- [46] Access control for interoperable energy management systems using Verifiable Credentials 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1540 - 1545
- [48] Combining Verifiable Credentials and Blockchain Tokens for Traceable and Offline Token Operations 2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
- [49] A Subject-Centric Credential Management Method based on the Verifiable Credentials 35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 508 - 510
- [50] Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy 2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME, DSN-S 2024, 2024, : 59 - 61