Cited By
View all- Gupta HNayak A(2024)Publish Subscribe System Security Requirement: A Case Study for V2V CommunicationIEEE Open Journal of the Computer Society10.1109/OJCS.2024.34429215(389-405)Online publication date: 2024
- Siddhartha CAbha CShiwanee BPrageet K(2023)Secure authentication protocol for IoT applications based on blockchain technologyi-manager's Journal on Computer Science10.26634/jcom.11.1.1938011:1(12)Online publication date: 2023
- Valero MSpoletini P(2023)RE Practices When Developing IoT for Healthcare: The Case of GlucoCheck2023 IEEE 31st International Requirements Engineering Conference Workshops (REW)10.1109/REW57809.2023.00074(379-382)Online publication date: Sep-2023
- Show More Cited By