共 50 条
- [41] The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks TELECOM, 2024, 5 (01): : 145 - 175
- [42] Efficient Techniques for Publicly Verifiable Delegation of Computation ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 119 - 128
- [43] A new concept in protocols: Verifiable computational delegation SECURITY PROTOCOLS, 1999, 1550 : 137 - 153
- [44] A tool for role-based chatting 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2505 - 2510
- [47] Role-based access control Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
- [48] Verifiable Delegation of Computation over Large Datasets ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 111 - 131
- [49] A Basic Framework of Blockchain-Based Decentralized Verifiable Outsourcing ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, INCOS - 2019, 2020, 1035 : 415 - 421
- [50] Role-based infrastructures for agents EIGHTH IEEE WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 210 - 214