Author:
Xiao Jiahong,Liang Wei,Cai Jiahong,Zhu Hangyu,Li Xiong,Xie Songyou
Publisher
Springer Nature Switzerland
Reference54 articles.
1. Xu, Z., et al.:A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE TII 18(10), 7118–7127 (2021)
2. Xie, Y., Liang, W., Li, R.F., et al.: An in-vehicle CAN signal packing algorithm for connected vehicle environment. J. Softw. 27(09), 2365–2376 (2016)
3. Chen, Y., Bellavitis, C.: Blockchain disruption and decentralized finance: The rise of decentralized business models. J. Bus. Vent. Insights 13, e00151 (2020)
4. Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM Trans. Multi. Comput. Commun. Appl. 12(4s), 1–18 (2016)
5. Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)