has been cited by the following article(s):
[1]
|
A lightweight IoT terminal authentication method based on the SM algorithm
2024 4th International Conference on Neural Networks, Information and Communication (NNICE),
2024
DOI:10.1109/NNICE61279.2024.10499194
|
|
|
[2]
|
A lightweight IoT terminal authentication method based on the SM algorithm
2024 4th International Conference on Neural Networks, Information and Communication (NNICE),
2024
DOI:10.1109/NNICE61279.2024.10499194
|
|
|
[3]
|
A literature review on V2X communications security: Foundation, solutions, status, and future
IET Communications,
2024
DOI:10.1049/cmu2.12778
|
|
|
[4]
|
A literature review on V2X communications security: Foundation, solutions, status, and future
IET Communications,
2024
DOI:10.1049/cmu2.12778
|
|
|
[5]
|
Research on NFC Anti-Counterfeit Traceability Based on Signcryption AlgorithmResearch on NFC Anti-Counterfeit Traceability
2023 4th International Conference on Machine Learning and Computer Application,
2023
DOI:10.1145/3650215.3650383
|
|
|
[6]
|
Designs and Implements the electronic Signature System of Open Fixed-layout Document (OFD) format documents
2023 International Conference on Computer Applications Technology (CCAT),
2023
DOI:10.1109/CCAT59108.2023.00040
|
|
|
[7]
|
Research on NFC Anti-Counterfeit Traceability Based on Signcryption AlgorithmResearch on NFC Anti-Counterfeit Traceability
2023 4th International Conference on Machine Learning and Computer Application,
2023
DOI:10.1145/3650215.3650383
|
|
|
[8]
|
Secure encryption method for communication sensitive information based on multi-source information fusion
2022 6th International Conference on Wireless Communications and Applications (ICWCAPP),
2022
DOI:10.1109/ICWCAPP57292.2022.00045
|
|
|