[1]
|
Heterogeneous Integration Supply Chain Integrity Through Blockchain and CHSM
ACM Transactions on Design Automation of Electronic Systems,
2024
DOI:10.1145/3625823
|
|
|
[2]
|
Trustworthy Internet Based on Generalized Blockchain
2022 International Conference on Blockchain Technology and Information Security (ICBCTIS),
2022
DOI:10.1109/ICBCTIS55569.2022.00013
|
|
|
[3]
|
OpenFL: the open federated learning library
Physics in Medicine & Biology,
2022
DOI:10.1088/1361-6560/ac97d9
|
|
|
[4]
|
Phishing Attacks Detection A Machine Learning-Based Approach
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON),
2021
DOI:10.1109/UEMCON53757.2021.9666627
|
|
|
[5]
|
Hash-Chain-Based Cross-Regional Safety Authentication for Space-Air-Ground Integrated VANETs
Applied Sciences,
2020
DOI:10.3390/app10124206
|
|
|
[6]
|
An Efficient Decentralized Key Management Mechanism for VANET With Blockchain
IEEE Transactions on Vehicular Technology,
2020
DOI:10.1109/TVT.2020.2972923
|
|
|
[7]
|
Distributed, Secure, Self-Sovereign Identity for IoT Devices
2020 IEEE 6th World Forum on Internet of Things (WF-IoT),
2020
DOI:10.1109/WF-IoT48130.2020.9221144
|
|
|
[8]
|
Using Record Level Encryption for Securing Information in Classified Information Systems
Natural and Engineering Sciences,
2018
DOI:10.28978/nesciences.424677
|
|
|
[9]
|
Using Record Level Encryption for Securing Information in Classified Information Systems
Natural and Engineering Sciences,
2018
DOI:10.28978/nesciences.424677
|
|
|
[10]
|
Efficient Approaches to Ensure Certificate Authenticity for Public Key Infrastructure
Information Technology Journal,
2017
DOI:10.3923/itj.2017.79.84
|
|
|
[11]
|
A reliable and secure approach for efficient Car-to-Car communication in intelligent transportation systems
2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET),
2017
DOI:10.1109/WiSPNET.2017.8300034
|
|
|
[12]
|
Generation and verification of digital signature with two factor authentication
2016 International Workshop on Computational Intelligence (IWCI),
2016
DOI:10.1109/IWCI.2016.7860353
|
|
|
[13]
|
An efficient privacy protection solution for smart home application platform
2016 2nd IEEE International Conference on Computer and Communications (ICCC),
2016
DOI:10.1109/CompComm.2016.7925106
|
|
|