RETRACTED ARTICLE: Innovation performance of listed companies based on machine computing and data envelopment analysis
暂无分享,去创建一个
[1] Samiran Chattopadhyay,et al. A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment , 2019, IEEE Internet of Things Journal.
[2] S. Ghose,et al. Multiparty Quantum Key Agreement That is Secure Against Collusive Attacks , 2020, ArXiv.
[3] Hisham Dahshan,et al. Key Management in Web of Trust for Mobile Ad Hoc Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[4] Andrew P. Martin,et al. Threat-Based Security Analysis for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.
[5] Mimoza Durresi,et al. Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring , 2019, J. Ambient Intell. Humaniz. Comput..
[6] Ahmed Farouk,et al. Improving the security of quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom , 2018, Quantum Inf. Process..
[7] Gang Gan,et al. Internet of Things Security Analysis , 2011, 2011 International Conference on Internet Technology and Applications.
[8] Fenghua Li,et al. Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario , 2019, IEEE Access.
[9] B. Anand,et al. A secured multiplicative Diffie Hellman key exchange routing approach for mobile ad hoc network , 2019 .
[10] Dharma P. Agrawal,et al. Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[11] Paul Thomas,et al. Efficient DCT-based secret key generation for the Internet of Things , 2019, Ad Hoc Networks.
[12] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[13] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[14] Ahmed Farouk,et al. Secure dynamic multiparty quantum private comparison , 2019, Scientific Reports.
[15] Enrico Del Re,et al. Energy Efficiency Perspectives of PMR Networks , 2017, Inf..
[16] Chih-Cheng Chen,et al. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks , 2015, J. Sensors.
[17] Yehuda Lindell,et al. Introduction to Modern Cryptography, Second Edition , 2014 .
[18] Jingjing Huang,et al. Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[19] Vijay Kumar Jha,et al. Secure key-distribution in IoT cloud networks , 2017, 2017 Third International Conference on Sensing, Signal Processing and Security (ICSSS).
[20] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[21] Hassan N. Noura,et al. Lightweight and Secure D2D Authentication & Key Management Based on PLS , 2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall).
[22] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .
[23] Donggang Liu,et al. Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.
[24] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[25] Subhasish Banerjee,et al. An efficient mechanism to generate dynamic keys based on genetic algorithm , 2018 .
[26] Hayder A. Abdulbari,et al. Microfluidics Chip for Directional Solvent Extraction Desalination of Seawater , 2019, Scientific Reports.
[27] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..
[28] V. N. Sastry,et al. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things , 2017, Inf..