Author:
Hossain Md Jakir,Xu Chunxiang,Li Chuang,Mahmud S.M. Hasan,Zhang Xiaojun,Li Wanpeng
Funder
National Natural Science Foundation of China
China Scholarship Council
Subject
Hardware and Architecture,Software
Reference52 articles.
1. Authentication techniques and methodologies used in wireless body area networks;Hussain;J. Syst. Archit.,2019
2. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud;Nabeil;J. Syst. Archit.,2020
3. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs;Ali;J. Syst. Archit.,2020
4. Blockchain-based public integrity verification for cloud storage against procrastinating auditors;Zhang;IEEE Trans. Cloud Comput.,2019
5. Multi factor two-way hash-based authentication in cloud computing;DeviPriya;Int. J. Cloud Appl. Comput.,2020
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献