Author:
Yassein Muneer Bani,Aljawarneh Shadi,Qawasmeh Ethar,Mardini Wail,Khamayseh Yaser
Cited by
76 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PERFORMANCE COMPARISON OF ECC LIBRARIES FOR IOT DEVICES;Eskişehir Technical University Journal of Science and Technology A - Applied Sciences and Engineering;2024-06-28
2. Encryption Protocols and Security for 5G;Advances in Information Security, Privacy, and Ethics;2024-06-28
3. The Quantum Threat: Implications for Data Security and the Rise of Post-Quantum Cryptography;2024 IEEE 9th International Conference for Convergence in Technology (I2CT);2024-04-05
4. Comparative Analysis of LEACH Network Routing Protocol in Wireless Sensor Networks: A Survey;Wireless Personal Communications;2024-03
5. Cryptographic Algorithms for IoT Devices:A Quantum Analysis;2024 3rd International Conference for Innovation in Technology (INOCON);2024-03-01