共 47 条
[1]
Abbasi B.Z., 2017, 2017 23 INT C AUTOMA, P1
[2]
Abubaker N, 2017, IEEE CONF COMM NETW, P502, DOI 10.1109/CNS.2017.8228709
[3]
[Anonymous], 2018, ARXIV181000305
[4]
[Anonymous], 2018, Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives, DOI DOI 10.1007/978-981-10-5861-5_5
[5]
AVISPA, AVISPA: Automated validation of Internet security protocols and applications
[6]
Basin David A., 2005, International Journal of Information Security, V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
[7]
A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment
[J].
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA),
2017,
:1225-1231
[9]
Bonomi F., 2014, Big Data and Internet of Things, P169, DOI 10.1007/978-3-319-05029-4_7