Cited By
View all- Rao BWaoo A(2024)IMPLEMENTING TOKEN-BASED AUTHENTICATION AND MODIFIED HASHING FOR IOT SECURITYShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i1.2024.18805:1Online publication date: 31-Jan-2024
- Yuan BWu YYang MXing LWang XZou DJin H(2023)SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT PlatformIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.316231220:2(1656-1674)Online publication date: 1-Mar-2023
- Mazhar MSaleem YAlmogren AArshad JJaffery MRehman AShafiq MHamam H(2022)Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) FrameworkElectronics10.3390/electronics1107112611:7(1126)Online publication date: 2-Apr-2022
- Show More Cited By