Author:
Das Ayan Kumar,Kalam Sidra,Sahar Nausheen,Sinha Ditipriya
Subject
Law,General Computer Science
Reference75 articles.
1. Password-based authenticated key exchange in the three-party setting;Abdalla,2005
2. Advanced encryption standard (AES) algorithm to encrypt and decrypt data;Abdullah;Cryptography and Network Security,2017
3. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things;Airehrour;Future Generation Computer Systems,2019
4. "A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT);Alshehri;Computing,2019
5. "Quantum-based predictive fog scheduler for IoT applications;Bhatia;Computers in Industry,2019
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献