Cited By
View all- Guo YGuo YXiong PYang FZhang C(2024)Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired SecurityIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.338293419(4615-4627)Online publication date: 2-Apr-2024
- Hernández-Marcial BLimón XSánchez-García ÁPérez-Arriaga J(2024)Secure Cryptography Usage in Software Development: A Systematic Literature Review2024 12th International Conference in Software Engineering Research and Innovation (CONISOFT)10.1109/CONISOFT63288.2024.00036(218-227)Online publication date: 28-Oct-2024
- Al-Rumaim APawar J(2024)Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest AlgorithmIEEE Access10.1109/ACCESS.2024.344018712(110850-110861)Online publication date: 2024
- Show More Cited By