(1)
Hu, J. .; Wu, W. .; Chuan, T. .; Peng, Q. . Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System. JCSANDM 2025, 14, 623–652.