Linked e-resources
Details
Table of Contents
Authentication and key agreement
User Authentication Using Body Vibration Characteristics
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice
Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture
Data security
Cross-chain Data Auditing for Medical IoT Data
Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT
A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain
Analysis of a New Improved AES S-box Structure Rong
Network security
Social Internet of Tings trust management based on implicit social relationship
Romeo: SGX-based Software Anti-Piracy Framework
P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes
Network Situation Awareness Model based on Incomplete Information Game.
User Authentication Using Body Vibration Characteristics
An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server
Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice
Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture
Data security
Cross-chain Data Auditing for Medical IoT Data
Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT
A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain
Analysis of a New Improved AES S-box Structure Rong
Network security
Social Internet of Tings trust management based on implicit social relationship
Romeo: SGX-based Software Anti-Piracy Framework
P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes
Network Situation Awareness Model based on Incomplete Information Game.