Publisher
Springer Science and Business Media LLC
Reference41 articles.
1. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: Laih CS (ed) Advances in Cryptology - ASIACRYPT 2003. ASIACRYPT 2003. Lecture Notes in Computer Science, vol 2894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40061-5_29
2. Ateniese G, Hohenberger S (2005) Proxyre-signatures: new definitions, algorithms, and applications. In: ACM Conference on Computer and Communications Security, pp 310–319
3. Atzori L, Iera A, Morabito G (2002) The internet of things: a survey. Comput Netw 54(15):2787–2805
4. Baskar M, Gnansekaran T (2017) Developing efficient intrusion tracking system using region based traffic impact measure towards the denial of service attack mitigation. J Comput Theor Nanosci 14(7):3576–3582
5. Baskar M, Gnansekaran T (2017) Multi model network analysis for improved intrusion tracing towards mitigating DDoS attack. Asian J Res Soc Human 7(3):1343–1353
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献