共 25 条
[2]
[Anonymous], 2014, P 2014 EUR MED TELC
[3]
Bhadula S., 2020, INT J RECENT TECHNOL, V8
[4]
Bharathi M. V., 2012, P 2012 IEEE INT C CO
[6]
TEAM: Trust-Extended Authentication Mechanism for Vehicular Ad Hoc Networks
[J].
IEEE SYSTEMS JOURNAL,
2014, 8 (03)
:749-758
[7]
Taxonomy and analysis of security protocols for Internet of Things
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2018, 89
:110-125
[8]
Juyal S., 2020, P 2020 IEEE INT C EL, P1, DOI 10.1109/ CONECCT50063.2020.9198409
[9]
Kalnoor G, 2016, PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016)
[10]
Lu Tan, 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010), P376, DOI 10.1109/ICACTE.2010.5579543