共 50 条
- [41] User-controlled collaborations in the context of trust extended environments WET ICE 2007: 16TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2007, : 389 - 394
- [43] Unleashing the Disruptive Potential of User-Controlled Identity Management 2011 TECHNICAL SYMPOSIUM AT ITU TELECOM WORLD (ITU WT), 2011, : 1 - 6
- [44] Visual analytics approach to user-controlled evacuation scheduling VAST: IEEE SYMPOSIUM ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY 2007, PROCEEDINGS, 2007, : 43 - 50
- [45] Attribute-Based Signatures with User-Controlled Linkability CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 256 - +
- [46] USER-CONTROLLED COMMUNITY TECHNICAL AID - A SYMPOSIUM - INTRODUCTION TOWN PLANNING REVIEW, 1988, 59 (01): : 5 - 7
- [47] USER-CONTROLLED COMMUNITY TECHNICAL AID - A SYMPOSIUM - CONCLUSION TOWN PLANNING REVIEW, 1988, 59 (01): : 43 - 44
- [48] Reproducible and User-Controlled Software Environments in HPC with Guix EURO-PAR 2015: PARALLEL PROCESSING WORKSHOPS, 2015, 9523 : 579 - 591
- [49] Marrying transparency tools with user-controlled identity management FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 199 - 220
- [50] KYChain: User-Controlled KYC Data Sharing and Certification PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 301 - 307