Subject
Hardware and Architecture,Software
Reference137 articles.
1. How to leak a secret;Rivest,2001
2. Group signatures;Chaum,1991
3. Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment;Roman;Ad Hoc Netw.,2020
4. Fast and universal inter-slice handover authentication with privacy protection in 5G network;Lai;Secur. Commun. Netw.,2021
5. A comprehensive survey on authentication and privacy-preserving schemes in VANETs;Mundhe;Comp. Sci. Rev.,2021
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献