Author:
Poltavtsev A. A.,Khabarov A. R.,Selyankin A. O.
Subject
Signal Processing,Control and Systems Engineering,Software
Reference28 articles.
1. Baraani-Dastjerdi, A., Pieprzyk, J., Pieprzyk, B.-D.J., and Safavi-Naini, R., Security in Databases: A Survey Study, 1996, pp. 1–39.
2. Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936–946.
3. Jiang, Q., Ma, J., and Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE Syst. J., 2018, vol. 12, no. 2, pp. 2039–2042. https://doi.org/10.1109/JSYST.2016.2574719
4. Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, 2018. https://doi.org/10.1109/BlackSeaCom.2018.8433628
5. Konoplev, A.S. and Kalinin, M.O., Access control system for distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 664–668.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献