Cited By
View all- Yaacoub JNoura HSalman OChehab A(2022)Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendationsInternational Journal of Information Security10.1007/s10207-021-00545-821:1(115-158)Online publication date: 1-Feb-2022
- Benin AToledo STromer E(2015)Secure Association for the Internet of ThingsProceedings of the 2015 International Workshop on Secure Internet of Things10.1109/SIOT.2015.14(25-34)Online publication date: 21-Sep-2015
- Wang DWang P(2014)On the anonymity of two-factor authentication schemes for wireless sensor networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2014.07.01073:C(41-57)Online publication date: 14-Nov-2014
- Show More Cited By