Funder
National Research Foundation of Korea
Information Security Education & Awareness (ISEA) Phase II Project
Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Drones (2018)
http://www.h3dynamics.com/products/
. Accessed June 2018
2. Secure Hash Standard (2018) FIPS PUB 180-1, National Institute of Standards and Technology (NIST), US Department of Commerce, April 1995.
https://doi.org/10.6028/NIST.FIPS.180-4
. Accessed Jul 2018
3. Unmanned Aerial Vehicle (2018)
http://www.wikiwand.com/en/ Unmanned_aerial_vehicle
. Accessed June 2018
4. Amin R, Islam SKH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62
5. Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: International conference on the theory and applications of cryptographic techniques—advances in cryptology (EUROCRYPT 2001). Springer, Innsbruck (Tyrol), Austria, pp 453–474
Cited by
46 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献