“AUTHORIZATION MODELS FOR TRUSTLESS NODE INTERACTION IN PUBLIC DECENTRALIZED NETWORKS”. Information systems and technologies security 2, no. 8 (March 21, 2025): 56–59. Accessed February 16, 2026. https://ists.knu.ua//article/view/3748.