Cited By
View all- Lund BLee TWang ZWang TMannuru N(2024)Zero Trust Cybersecurity: Procedures and Considerations in ContextEncyclopedia10.3390/encyclopedia40400994:4(1520-1533)Online publication date: 11-Oct-2024
- Ou HPan CTseng YLin I(2024)Decentralized Identity Authentication Mechanism: Integrating FIDO and Blockchain for Enhanced SecurityApplied Sciences10.3390/app1409355114:9(3551)Online publication date: 23-Apr-2024
- Crampton JEiben EGutin GKarapetyan DMajumdar D(2024)Bi-objective Optimization in Role MiningACM Transactions on Privacy and Security10.1145/369783328:1(1-22)Online publication date: 14-Oct-2024
- Show More Cited By