共 47 条
[1]
Abdullah J., 2017, J. Telecommun., Electron. Comput. Eng. (JTEC), V9, P99
[2]
Adat V, 2018, IEEE GLOB COMM CONF
[3]
Blockchain in Internet-of-Things: Architecture, Applications and Research Directions
[J].
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS),
2019,
:314-319
[4]
Anomaly Detection Using Deep Neural Network for IoT Architecture
[J].
APPLIED SCIENCES-BASEL,
2021, 11 (15)
[5]
Aqeel Sehrish, 2022, EDPACS: The EDP Audit, Control, and Security Newsletter, P1, DOI 10.1080/07366981.2021.1958742
[7]
Balan K, 2018, INT J ADV COMPUT SC, V9, P298
[8]
SDR Implementation of a D2D Security Cryptographic Mechanism
[J].
IEEE ACCESS,
2019, 7
:38847-38855
[9]
Bos J., 2009, IACR CRYPTOL EPRINT, V57, P1
[10]
Boyd C., 1994, ADV CRYPTOLOGY EUROC, V765, DOI [10.1007/3-540-48285-7_20, DOI 10.1007/3-540-48285-7_20]