相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Evolutionary-based image encryption using RNA codons truth table
Maqsood Mahmud et al.
OPTICS AND LASER TECHNOLOGY (2020)
A survey on continuous authentication methods in Internet of Things environment
Fatimah Hussain Al-Naji et al.
COMPUTER COMMUNICATIONS (2020)
Mitigating and Monitoring Smart City Using Internet of Things
Sudan Jha et al.
CMC-COMPUTERS MATERIALS & CONTINUA (2020)
Modeling, Simulation and Optimization of Power Plant Energy Sustainability for IoT Enabled Smart Cities Empowered With Deep Extreme Learning Machine
Sagheer Abbas et al.
IEEE ACCESS (2020)
Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network
Pei-Yih Ting et al.
IEEE SYSTEMS JOURNAL (2018)
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
Mohamed Tahar Hammi et al.
COMPUTERS & SECURITY (2018)
IoT security: Review, blockchain solutions, and open challenges
Minhaj Ahmad Khan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Secure data uploading scheme for a smart home system
Jian Shen et al.
INFORMATION SCIENCES (2018)
Blockchain Security and Privacy
Ghassan Karame et al.
IEEE SECURITY & PRIVACY (2018)
Improving OCSP-Based Certificate Validations in Wireless Ad Hoc Networks
Mohammad Masdari et al.
WIRELESS PERSONAL COMMUNICATIONS (2015)
Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things
Fagen Li et al.
IEEE SENSORS JOURNAL (2013)