[1]
J. . Hu, W. . Wu, T. . Chuan, and Q. . Peng, “Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System”, JCSANDM, vol. 14, no. 03, pp. 623–652, Aug. 2025.