Author:
Aboudagga Nidal,Refaei Mohamed Tamer,Eltoweissy Mohamed,DaSilva Luiz A.,Quisquater Jean-Jacques
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Applying Human Behaviour Recognition in Cloud Authentication Method—A Review;Proceedings of International Conference on Emerging Technologies and Intelligent Systems;2021-12-03
2. Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE;Sensors;2021-09-02
3. pTASC;Proceedings of the 20th International Conference on Distributed Computing and Networking;2019-01-04
4. Authentication in mobile cloud computing: A survey;Journal of Network and Computer Applications;2016-02
5. Attacks on Confidentiality of Communications Between Stranger Organizations;International Journal of Knowledge-Based Organizations;2013-04