Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference40 articles.
1. Nowhere to hide: efficiently identifying probabilistic cloning attacks in large-scale RFID systems;Ai;IEEE Trans. Inf. Forensics Secur.,2020
2. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams;Aitzhan;IEEE Trans. Dependable Secure Comput.,2018
3. A comparative evaluation of blockchain systems for application sharing using containers;Brinckman,2017
4. Efficient and reliable missing tag identification for large-scale RFID systems with unknown tags;Chen;IEEE Internet Things J.,2017
5. Blockchain: a panacea for healthcare cloud-based data security and privacy?;Esposito;IEEE Cloud Comput.,2018
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献