共 50 条
- [2] Risk Analysis of a GDPR-Compliant Deletion Technique for Consortium Blockchains Based on Pseudonymization COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT VIII, 2021, 12956 : 3 - 14
- [3] A hash-based pseudonymization infrastructure for RFID systems SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
- [4] Blockchain-based Auxiliary Systems for Pseudonymization and Consent Management TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2023, 12 (04): : 2470 - 2480
- [5] Multidimensional risk to networks of distributed systems SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 1481 - 1488
- [7] A new approach to probabilistic risk analysis in concurrent and distributed design of aerospace systems PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2005, VOL 2, PTS A AND B, 2005, : 1215 - 1224
- [8] De-pseudonymization of Smart Metering Data: Analysis and Countermeasures 2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 73 - 78
- [10] Diagnosability analysis for distributed systems 2002 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2002, : 2943 - 2951