共 50 条
- [21] Mutual Authentication for Mobile Cloud Computing: Review and Suggestion [J]. 2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), 2017, : 75 - 80
- [22] Efficient implementation of the keyed-hash message authentication code based on SHA-1 algorithm for mobile trusted computing [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 410 - +
- [25] Edge Computing-Based VANETs' Anonymous Message Authentication [J]. SYMMETRY-BASEL, 2022, 14 (12):
- [26] Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 910 - 913
- [27] A scheme based on trusted computing for terminal security [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
- [28] Design and Implementation of RFID Mutual Authentication Protocol [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 229 - 232
- [29] An FPGA Implementation of Stochastic Computing-based LSTM [J]. 2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 38 - 46
- [30] Analytical offloading design for mobile edge computing-based smart internet of vehicle [J]. EURASIP Journal on Advances in Signal Processing, 2022