共 50 条
- [32] Secure and Authenticated Access to LLN Resources Through Policy Constraints INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015, 2015, 9311 : 271 - 280
- [33] A secure bootstrap based on trusted computing 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
- [34] Secure Fog Computing for Smart Living 2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 707 - 707
- [36] Secure sharing with cryptography in cloud computing 2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
- [37] A Secure Billing Protocol for Grid Computing PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 320 - +
- [38] Secure integration of IoT and Cloud Computing FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 964 - 975
- [40] eNVM based In-memory Computing for Intelligent and Secure Computing Systems 32ND IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (IEEE SOCC 2019), 2019, : 348 - 353