Found: 5
Select item for more details and to access through your institution.
Intelligent Security Authentication for Connected and Autonomous Vehicles: Attacks and Defenses.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 8, p. 1577, doi. 10.3390/electronics13081577
- By:
- Publication type:
- Article
A Memorable Communication Method Based on Cryptographic Accumulator.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 6, p. 1081, doi. 10.3390/electronics13061081
- By:
- Publication type:
- Article
A Secure Communication Method Based on Message Hash Chain.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 9, p. N.PAG, doi. 10.3390/app12094505
- By:
- Publication type:
- Article
An attack-defense trees model based on analytic hierarchy process.
- Published in:
- China Sciencepaper, 2018, v. 13, n. 14, p. 1644
- By:
- Publication type:
- Article
The application of nanomaterials in controlled drug delivery for bone regeneration.
- Published in:
- Journal of Biomedical Materials Research, Part A, 2015, v. 103, n. 12, p. 3978, doi. 10.1002/jbm.a.35522
- By:
- Publication type:
- Article