共 8 条
- [1] Chandrasekaran B, 2016, PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), P243, DOI 10.1109/ICATCCT.2016.7912001
- [2] Secure and Efficient Data Communication Protocol for Wireless Body Area Networks [J]. IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (02): : 94 - 107
- [3] DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 151 - 167
- [4] Li HW, 2015, KSII T INTERNET INF, V9, P1404
- [6] Sathya D, 2017, HEALTHC TECHNOL LETT, V4, P228, DOI 10.1049/htl.2017.0033
- [7] Schneier B., 1999, TWOFISH ENCRYPTION A
- [8] Zhang YH, 2014, LECT NOTES COMPUT SC, V8782, P259, DOI 10.1007/978-3-319-12475-9_18