AUTHORIZATION MODELS FOR TRUSTLESS NODE INTERACTION IN PUBLIC DECENTRALIZED NETWORKS. Information systems and technologies security, [S. l.], v. 2, n. 8, p. 56–59, 2025. DOI: 10.17721/ISTS.2024.8.56-59. Disponível em: https://ists.knu.ua//article/view/3748. Acesso em: 16 feb. 2026.