Cited By
View all- D'Arco PDe Prisco Rdel Pozo A(2024)Efficient and reliable post-quantum authenticationTheoretical Computer Science10.1016/j.tcs.2024.114597(114597)Online publication date: May-2024
- Xiao HPei QSong XShi W(2022)Authentication Security Level and Resource Optimization of Computation Offloading in Edge Computing SystemsIEEE Internet of Things Journal10.1109/JIOT.2021.31392229:15(13010-13023)Online publication date: 1-Aug-2022
- Alkhuder S(2018)Securing Ad-Hoc On-Demand Distance Vector Protocol in Wireless Sensor Networks: Working with What the Node Can Offer2018 International Conference on Computing Sciences and Engineering (ICCSE)10.1109/ICCSE1.2018.8374222(1-6)Online publication date: Mar-2018
- Show More Cited By