Author:
Araghi Tanya Koohpayeh,Megías David,Rosales Andrea
Publisher
Springer Nature Switzerland
Reference24 articles.
1. Kore, A., Patil, S.: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system. Wireless Netw. 28(1), 287–301 (2021). https://doi.org/10.1007/s11276-021-02850-5
2. Demertzi, V., Demertzis, S., Demertzis, K.: An Overview of Cyber Threats, Attacks, and Countermeasures on the Primary Domains of Smart Cities. arXiv preprint arXiv:2207.04424 (2022)
3. Vani, G., Shariff, N.C., Biradar, R.K.L.: An investigation of secure authentication systems in wireless sensor networks. Int. J. Early Childhood 14, 2022 (2022)
4. Sumathi, A.C., Akila, M., Pérez de Prado, R., Wozniak, M., Divakarachari, P.B.: Dynamic bargain game theory in the internet of things for data trustworthiness. Sensors 21, 7611 (2021)
5. Mo, J., Hu, Z., Shen, W.: A provably secure three-factor authentication protocol based on chebyshev chaotic mapping for wireless sensor network. IEEE Access 10, 12137–12152 (2022)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献