Publisher
Springer International Publishing
Reference30 articles.
1. Alghamdi, T. A., Lasebae, A., & Aiash, M. (2013). Security analysis of the constrained application protocol in the Internet of Things. In Future Generation Communication Technology (FGCT), 2013 Second International Conference (pp. 163–168). IEEE.
2. Alzaqebah, A., Al-Sayyed, R., & Masadeh, R. (2019). Task scheduling based on modified grey wolf optimizer in cloud computing environment. In 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS) (pp. 1–6). IEEE.
3. Alzubi, O. A. (2015, September). Performance Evaluation of AG Block Turbo Codes over Fading Channels Using BPSK. In Proceedings of the The International Conference on Engineering & MIS 2015 (p. 36). ACM.
4. Alzubi, O. A., Chen, T. M., Alzubi, J. A., Rashaideh, H., & Al-Najdawi, N. (2016). Secure channel coding schemes based on algebraic-geometric codes over hermitian curves. Journal of Universal Computer Science, 22(4), 552–566.
5. Asif, R. A. (2016). Efficient computation for hyper elliptic curve based cryptography. University of Windsor.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献