Subject
Management of Technology and Innovation,Artificial Intelligence,Computer Science Applications,Hardware and Architecture,Engineering (miscellaneous),Information Systems,Computer Science (miscellaneous),Software
Reference40 articles.
1. SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems;Wang;IEEE Internet Things J.,2019
2. ECCbAP: A secure ECC-based authentication protocol for IoT edge devices;Rostampour;Pervasive Mob. Comput.,2020
3. A privacy-aware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain;Zhang;IEEE Internet Things J.,2021
4. BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology;Vivekanandan;Peer-to-Peer Netw. Appl.,2021
5. D. Basin, J. Dreier, L. Hirschi, S. Radomirović, R. Sasse, V. Stettler, A Formal Analysis of 5G Authentication, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 1383–1396, Journal Abbreviation: CCS ’18.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献