Author:
Andola Nitish,Prakash Sourabh,Gahlot Raghav,Venkatesan S.,Verma Shekhar
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference40 articles.
1. Akherfi, K., Gerndt, M., Harroud, H.: Mobile cloud computing for computation offloading: issues and challenges. Appl. Comput. Inform. 14(1), 1–16 (2018)
2. Alamsyah, Z., Mantoro, T., Adityawarman, U., Ayu, M.A.: Combination RSA with one time pad for enhanced scheme of two-factor authentication. In: 2020 6th International Conference on Computing Engineering and Design (ICCED), pp. 1–5. IEEE (2020)
3. Alhejazi, M.M., Al-Dahasi, E.M., Saqib, N.A.: A new remote user authentication scheme for e-health-care applications using steganography. In: 2019 2nd International Conference on Computer Applications and Information Security (ICCAIS), pp 1–10. IEEE (2019)
4. Burrows, M., Abadi, M.: A logic of authentication. Proc. R. Soc. Lond. A (1989). https://doi.org/10.1098/rspa.1989.0125
5. Chaffetz, J., Meadows, M., Hurd, W.: The OPM Data Breach: How the Government Jeopardized Our National Security for More than a Generation. Report (2016)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献