Results 291 to 296 of about 319,627 (296)
Some of the next articles are maybe not open access.
IEEE Transactions on Vehicular Technology, 2019
A user (external party) is interested in accessing the real-time data from some designated drones of a particular fly zone in the Internet of Drones (IoD) deployment.
Jangirala Srinivas +3 more
semanticscholar +1 more source
A user (external party) is interested in accessing the real-time data from some designated drones of a particular fly zone in the Internet of Drones (IoD) deployment.
Jangirala Srinivas +3 more
semanticscholar +1 more source
Cloud Centric Authentication for Wearable Healthcare Monitoring System
IEEE Transactions on Dependable and Secure Computing, 2019Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers.
Jangirala Srinivas +3 more
semanticscholar +1 more source
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
IEEE Transactions on Dependable and Secure Computing, 2018Ding Wang, Ping Wang
semanticscholar +1 more source
Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain
IEEE Transactions on Industrial Informatics, 2021Xiaoding Wang +5 more
semanticscholar +1 more source
Entity Authentication and Key Distribution
Annual International Cryptology Conference, 1993M. Bellare, P. Rogaway
semanticscholar +1 more source

