Author:
Xu Guangquan,Liu Jia,Lu Yanrong,Zeng Xianjiao,Zhang Yao,Li Xiaoming
Funder
National Science Foundation of China
Tianjin Research Program of Application Foundation and Advanced Technology
Fundamental Research of Xinjiang Corps
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference34 articles.
1. A secure three-factor user authentication and key agreement protocol for TMIS with user anonymity;Amin;J. Med. Syst.,2015
2. A pseudonym management system to achieve anonymity in vehicular Ad Hoc Networks;Artail;IEEE Trans. Dependable Secur.,2016
3. AVISPA. Automated validation of internet security protocols and applications. [Online]. Available: http://www.avispa-project.org/. Accessed January 2015.
4. Traffic and mobility aware resource prediction using cognitive agent in mobile ad hoc networks;Chaudhari;J. Netw. Comput. Appl.,2016
5. A differential privacy-based query model for sustainable fog data centers;Du;IEEE Tran. on Sustain. Comput.,2017
Cited by
67 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献