[1]
2025. AUTHORIZATION MODELS FOR TRUSTLESS NODE INTERACTION IN PUBLIC DECENTRALIZED NETWORKS. Information systems and technologies security. 2, 8 (Mar. 2025), 56–59. DOI:https://doi.org/10.17721/ISTS.2024.8.56-59.