A Multiple End-Devices Authentication Scheme for LoRaWAN.Published in:Electronics (2079-9292), 2022, v. 11, n. 5, p. 797, doi. 10.3390/electronics11050797By:Fan, Chun-I;Zhuang, Er-Shuo;Karati, Arijit;Su, Chun-HuiPublication type:Article
Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices.Published in:Mathematics (2227-7390), 2023, v. 11, n. 18, p. 3830, doi. 10.3390/math11183830By:Zhuang, Er-Shuo;Fan, Chun-IPublication type:Article