Author:
Qazi Rosheen,Qureshi Kashif Naseer,Bashir Faisal,Islam Najam Ul,Iqbal Saleem,Arshad Arsalan
Publisher
Springer Science and Business Media LLC
Reference53 articles.
1. Aliero MS, Ghani I, Qureshi KN, Rohani MFA (2020) An algorithm for detecting SQL injection vulnerability using black-box testing. J Ambient Intell Human Comput 11(1):249–266
2. Alkady Y, Habib MI, Rizk RY (2013) A new security protocol using hybrid cryptography algorithms. In: Paper presented at the 2013 9th International Computer Engineering Conference (ICENCO)
3. Alkhatib AAA, Baicher GS (2012) Wireless sensor network architecture. In: Paper presented at the 2012 international conference on computer networks and communication systems (CNCS 2012)
4. Amin R, Islam SH, Biswas G, Obaidat MS (2018) A robust mutual authentication protocol for WSN with multiple base-stations. Ad Hoc Netw 75:1–18
5. Bashaa MH, Al-Alak SM, Idrees AK (2019) Secret key generation in wireless sensor network using public key encryption. In: Paper presented at the proceedings of the international conference on information and communication technology
Cited by
47 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献