Author:
Sarkar Arpita,Singh Binod Kumar
Publisher
Springer International Publishing
Reference41 articles.
1. Vipindev, A., & Gupta, B. (2018). Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423–441.
2. Gupta, B. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives (p. 666). Boca Raton, FL: CRC Press, Taylor & Francis.
3. Gupta, B., Agrawal, D. P., & Shingo, Y. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Pennsylvania: IGI Global.
4. Stallings, W. (2010). Cryptography and network security: Principles and practice (5th ed.). Upper Saddle River, NJ: Prentice Hall.
5. Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., & Smith, A. (2005). Secure remote authentication using biometric data. In Eurocrypt.
https://doi.org/10.1007/11426639_9
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献