Found: 15
Select item for more details and to access through your institution.
A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks.
- Published in:
- Symmetry (20738994), 2022, v. 14, n. 8, p. 1625, doi. 10.3390/sym14081625
- By:
- Publication type:
- Article
Patients', pharmacists', and prescribers' attitude toward using blockchain and machine learning in a proposed ePrescription system: online survey.
- Published in:
- JAMIA Open, 2022, v. 5, n. 1, p. 1, doi. 10.1093/jamiaopen/ooab115
- By:
- Publication type:
- Article
A Novel Distributed Ledger Technology Structure for Wireless Sensor Networks Based on IOTA Tangle.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 15, p. 2403, doi. 10.3390/electronics11152403
- By:
- Publication type:
- Article
Performance Analysis and Design Considerations of the Shallow Underwater Optical Wireless Communication System with Solar Noises Utilizing a Photon Tracing-Based Simulation Platform.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 5, p. 632, doi. 10.3390/electronics10050632
- By:
- Publication type:
- Article
Sensing and Signal Processing in Smart Healthcare.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Vulnerabilities' Assessment and Mitigation Strategies for the Small Linux Server, Onion Omega2.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 6, p. 967, doi. 10.3390/electronics9060967
- By:
- Publication type:
- Article
HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 4, p. 417, doi. 10.1007/s10207-016-0341-1
- By:
- Publication type:
- Article
Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs).
- Published in:
- Sensors (14248220), 2018, v. 18, n. 12, p. 4258, doi. 10.3390/s18124258
- By:
- Publication type:
- Article
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 9, p. 23145, doi. 10.3390/s150923145
- By:
- Publication type:
- Article
Distributed Ledger Technologies and Their Applications: A Review.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7898, doi. 10.3390/app12157898
- By:
- Publication type:
- Article
An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 5, p. 2082, doi. 10.3390/app11052082
- By:
- Publication type:
- Article
An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network.
- Published in:
- Wireless Personal Communications, 2015, v. 84, n. 3, p. 2035, doi. 10.1007/s11277-015-2546-4
- By:
- Publication type:
- Article
Evaluating Consumer Behavior, Decision Making, Risks, and Challenges for Buying an IoT Product.
- Published in:
- Internet of Things (IoT), 2023, v. 4, n. 2, p. 78, doi. 10.3390/iot4020005
- By:
- Publication type:
- Article
MDA: message digest-based authentication for mobile cloud computing.
- Published in:
- Journal of Cloud Computing (2192-113X), 2016, v. 5, n. 1, p. 1, doi. 10.1186/s13677-016-0068-6
- By:
- Publication type:
- Article
RFID Mutual Authentication Protocols based on Gene Mutation and Transfer.
- Published in:
- Journal of Communications Software & Systems, 2013, v. 9, n. 1, p. 44, doi. 10.24138/jcomss.v9i1.157
- By:
- Publication type:
- Article