Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Authentication and key agreement
User Authentication Using Body Vibration Characteristics
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice
Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture
Data security
Cross-chain Data Auditing for Medical IoT Data
Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT
A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain
Analysis of a New Improved AES S-box Structure Rong
Network security
Social Internet of Tings trust management based on implicit social relationship
Romeo: SGX-based Software Anti-Piracy Framework
P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes
Network Situation Awareness Model based on Incomplete Information Game.

Browse Subjects

Show more subjects...

Statistics

from
to
Export