Enterprise Internal Threat Authentication Traceability Technology Based on Key Authentication System | River Publishers Journals & Magazine | IEEE Xplore