Author:
Shyla S. Immaculate,Sujatha S. S.
Publisher
Springer Science and Business Media LLC
Reference34 articles.
1. Bai TDP, Raj KM, Rabara SA (2017) Elliptic curve cryptography based security framework for internet of things (IoT) enabled smart card. In: 2017 World congress on computing and communication technologies (WCCCT) IEEE, pp 43–46
2. Brindha T, Shaji RS (2018) A secure transaction of cloud data using conditional source trust attributes encryption mechanism. Soft Comput 22(3):1013–1022
3. Burger PM (2001) Biometric authentication system. U.S. Patent 6(219): 439
4. Cheng H, Rong C, Qian M, Wang W (2018) Accountable Privacy-preserving mechanism for cloud computing based on identity-based encryption. IEEE Access 6:37869–37882
5. De la Prieta F, Rodríguez-González S, Chamoso P, Corchado JM, Bajo J (2019) Survey of agent-based cloud computing applications. Future Gener Comput Syst 100:223–236
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献