Author:
Huang Zitian,Wang Huanyu,Cao Bijia,He Dalin,Wang Junnian
Reference44 articles.
1. Secure integration of asymmetric and symmetric encryption schemes;Fujisaki;J. Cryptology,2013
2. Secure and efficient authenticated key management scheme for UAV-assisted infrastructure-less IoVs;Tan;IEEE Trans. Intell. Transp. Syst.,2023
3. A privacy-preserving attribute-based authenticated key management scheme for accountable vehicular communications;Tan;IEEE Trans. Veh. Technol.,2023
4. Towards sound approaches to counteract power-analysis attacks;Chari,1999
5. Shuffling against side-channel attacks: A comprehensive study with cautionary note;Veyrat-Charvillon,2012