Author:
Maurya Chanchal,Chaurasiya Vijay Kumar
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference60 articles.
1. AVISPA (2019) Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed: Oct 2019
2. Agyekum O, Opuni-Boachie K, Qi X, Sifah EB, Gao J, Xia H, Xiaojiang D, Guizani M (2019) A secured proxy-based data sharing module in IoT environments using blockchain. Sensors 19(5):1235
3. Akpakwu GA, Silva BJ, Hancke GP, Abu-Mahfouz AM (2018) A survey on 5G networks for the internet of things: communication technologies and challenges. IEEE Access 6:3619–3647
4. Ali M, Abbas A, Khan U, Khan SU (2018) SeSPHR: a methodology for secure sharing of personal health records in the cloud. IEEE Trans Cloud Comput
5. Ali M, Sadeghi M-R, Liu X (2020) Lightweight revocable hierarchical attribute-based encryption for internet of things. IEEE Access 8:23951–23964
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献