Author:
Thungon Leki Chom,Ravinandan ,Hussain Md. Iftekhar
Reference19 articles.
1. Bao F, Deng RH, Mao W (1998) Efficient and practical fair exchange protocols with off-line TTP. In: 1998 IEEE symposium on security and privacy, 1998. Proceedings, pp. 77–85. IEEE (1998)
2. Bengio S, Brassard G, Desmedt YG, Goutier C, Quisquater JJ (1991) Secure implementation of identification systems. J Cryptol 4(3):175–183
3. Boneh D, DeMillo RA, Lipton RJ (1997) On the importance of checking cryptographic protocols for faults. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 37–51
4. Computing F (2015) The Internet of Things: extend the cloud to where the things are. In: Cisco white paper
5. Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans ind inf 10(4):2233–2243
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards an Energy-Efficient Hash-based Message Authentication Code (HMAC);2022 IEEE 13th International Green and Sustainable Computing Conference (IGSC);2022-10-24