Cited By
View all- Alsheavi AHawbani AOthman WWang XQaid GZhao LAl-Dubai AZhi LIsmail AJhaveri RAlsamhi SAl-Qaness M(2025)IoT Authentication Protocols: Challenges, and Comparative AnalysisACM Computing Surveys10.1145/370344457:5(1-43)Online publication date: 9-Jan-2025
- Saideh MJamont JVercouter L(2024)Opportunistic Sensor-Based Authentication Factors in and for the Internet of ThingsSensors10.3390/s2414462124:14(4621)Online publication date: 17-Jul-2024
- Singla DVerma N(2024)Performance Analysis of Authentication System: A Systematic Literature ReviewRecent Advances in Computer Science and Communications10.2174/012666255824653123112111551417:7Online publication date: Oct-2024
- Show More Cited By