1.
Hu J, Wu W, Chuan T, Peng Q. Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System. JCSANDM [Internet]. 2025 Aug. 12 [cited 2026 Apr. 27];14(03):623–652. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/29145