Author:
Escoffier Clement,Chollet Stephanie,Lalanda Philippe
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security of Connected Devices;Advances in Information Security, Privacy, and Ethics;2024-06-30
2. Refillable PUF authentication protocol for constrained devices;Journal of Ambient Intelligence and Smart Environments;2022-05-30
3. Elastic AI: system support for adaptive machine learning in pervasive computing systems;CCF Transactions on Pervasive Computing and Interaction;2021-07-19
4. PUF-Based Protocol for Securing Constrained Devices;2021 17th International Conference on Intelligent Environments (IE);2021-06
5. A conflicts’ classification for IoT-based services: a comparative survey;PeerJ Computer Science;2021-04-27