共 184 条
- [81] Kulkarni Raghavendra V., 2009, Proceedings 2009 International Joint Conference on Neural Networks (IJCNN 2009 - Atlanta), P1680, DOI 10.1109/IJCNN.2009.5179075
- [82] Kumar J, 2017, 2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), P36, DOI 10.1109/PKIA.2017.8278958
- [83] Kumar M., HACK WIFI PASSWORD S
- [84] Security Enhancements to System on Chip Devices for IoT Perception Layer [J]. 2017 3RD IEEE INTERNATIONAL SYMPOSIUM ON NANOELECTRONIC AND INFORMATION SYSTEMS (INIS), 2017, : 151 - 156
- [85] Laplante PA, 2018, IT PROF, V20, P15
- [86] Time-bound key-aggregate encryption for cloud storage [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2059 - 2069
- [87] Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1832 - 1843
- [88] Securing SDN Infrastructure of IoT-Fog Networks From MitM Attacks [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1156 - 1164
- [90] An energy-aware Edge Server Placement Algorithm in Mobile Edge Computing [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2018, : 66 - 73