Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference65 articles.
1. Password-based authenticated key exchange in the three-party setting;Abdalla,2005
2. Analyzing of LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment;Alsahlani,2020
3. The AVISPA tool for the automated validation of internet security protocols and applications;Armando,2005
4. Banerjee, S., Mukhopadhyay, D., 2006. Symmetric key based authenticated querying in wireless sensor networks. In: Proceedings of the First International Conference on Integrated Internet Ad Hoc and Sensor Networks, pp. 22–es.
5. IoT and cloud convergence: Opportunities and challenges;Biswas,2014
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献