Subject
Law,General Computer Science
Reference39 articles.
1. An attribute-based encryption scheme to secure fog communications;Alrawais;IEEE Access,2017
2. Secure vanets: trusted communication scheme between vehicles and infrastructure based on fog computing;Arif;Stud. Inform. Control,2018
3. Promacs: progressive and resynchronizing macs for continuous efficient authentication of message streams;Armknecht,2020
4. A modular approach to key safeguarding;Asmuth;IEEE Trans. Inf. Theory,1983
5. On the security goals of white-box cryptography;Bock;IACR Trans. Cryptogr. Hardw. Embed. Syst.,2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Time-Specific Integrity Service in MQTT Protocol;2024 23rd ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN);2024-05-13
2. Technological management framework for gas chemical industry using IOT;International Journal of Research Studies in Education;2024-03-02