Found: 8
Select item for more details and to access through your institution.
Research of a new security mechanism on energy internet.
- Published in:
- Indian Journal of Power & River Valley Development, 2021, v. 71, n. 7/8, p. 123
- By:
- Publication type:
- Article
A trust enhancement scheme for cluster-based wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 5, p. 2761, doi. 10.1007/s11227-018-2693-y
- By:
- Publication type:
- Article
Privacy-aware access control for message exchange in vehicular ad hoc networks.
- Published in:
- Telecommunication Systems, 2015, v. 58, n. 4, p. 349, doi. 10.1007/s11235-014-9881-8
- By:
- Publication type:
- Article
Research on Linux Trusted Boot Method Based on Reverse Integrity Verification.
- Published in:
- Scientific Programming, 2016, p. 1, doi. 10.1155/2016/4516596
- By:
- Publication type:
- Article
Unbalanced tree-formed verification data for trusted platforms.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 7, p. 622, doi. 10.1002/sec.1385
- By:
- Publication type:
- Article
A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2171, doi. 10.1002/sec.1162
- By:
- Publication type:
- Article
Security analysis of SM2 key exchange protocol in TPM2.0.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 3, p. 383, doi. 10.1002/sec.987
- By:
- Publication type:
- Article
A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2016, p. 1, doi. 10.1155/2016/3815834
- By:
- Publication type:
- Article