Author:
Chawla Diksha,Mehra Pawan Singh
Reference28 articles.
1. Authentication Protocols for Internet of Things: A Comprehensive Survey;Ferrag;Secur. Commun. Networks.,2017
2. Using Quantum Key Distribution and ECC for Secure Inter-Device Authentication and Communication in IoT Infrastructure;Lohachab;SSRN Electron. J.,2018
3. Quantum computing: A taxonomy, systematic review and future directions;Gill;Softw. - Pract. Exp.,2022
4. V. Hassija, V. Chamola, A. Goyal, S.S. Kanhere, N. Guizani, Forthcoming applications of quantum computing : peeking into the future, 1 (2020) 35–41. https://doi.org/10.1049/iet-qtc.2020.0026.
5. Securing IOT network through quantum key distribution;Krithika;Int. J. Innov. Technol. Explor. Eng.,2019
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献