Cited By
View all- Scalise PGarcia RBoeding MHempel MSharif H(2024)An Applied Analysis of Securing 5G/6G Core Networks with Post-Quantum Key Encapsulation MethodsElectronics10.3390/electronics1321425813:21(4258)Online publication date: 30-Oct-2024
- Alexei APlaton NBolun IAlexei A(2024)Smart and Digital Healthcare. Advanced Technologies and Security IssuesProceedings of the Central and Eastern European eDem and eGov Days 202410.1145/3670243.3673857(288-294)Online publication date: 12-Sep-2024
- Xu PWu HTao XWang CChen DNan G(2024)Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2024.335380711:9(16561-16577)Online publication date: 1-May-2024
- Show More Cited By