A Blockchain-Based User Identity Authentication Method for 5G

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:MobiSec (5. : 2021 : Jeju; Online) Mobile internet security
1. Verfasser: Tu, Zhe (VerfasserIn)
Weitere Verfasser: Zhou, Huachun (VerfasserIn), Li, Kun (VerfasserIn), Song, Haoxiang (VerfasserIn), Wang, Weilin (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Distributed Trust and Reputation Services in Pervasive Internet-of-Things Deployments 2022 Bordel, Borja
The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method 2022 Zhang, Tianhong
Smart Contract-Based Personal Data Protection Framework: In Cross-App Advertising 2022 Shi, Yuyuan
Forensic Analysis of Apple CarPlay: A Case Study 2022 Lee, Junsu
A DDoS Detection Method with Feature Set Dimension Reduction 2022 Li, Man
Comparative Analysis of Bluetooth LE and EDHOC for Potential Security Protocol in Artificial Pancreas System 2022 Duguma, Daniel Gerbi
A Necessary Condition for Industrial Internet of Things Sustainability 2022 Dakhnovich, Andrei
Effectiveness of Video-Classification in Android Malware Detection Through API-Streams and CNN-LSTM Autoencoders 2022 D’Angelo, Gianni
Ensuring the Big Data Integrity Through Verifiable Zero-Knowledge Operations 2022 Aleksandrova, Elena B.
Secure LoRaWAN Root Key Update Scheme for IoT Environment 2022 Tsai, Kun-Lin
A Credible Information Fusion Method Based on Cascaded Topology Interactive Traceability 2022 Gao, Yueging
Semantic Embedding-Based Entity Alignment for Cybersecurity Knowledge Graphs 2022 Kim, Minhwan
A Secure Dispersed Computing Scheme for Internet of Mobile Things 2022 Zhao, Yan
Future Applications of Blockchain in Education Sector: A Semantic Review 2022 Gharat, Paresh Sajan
A Blockchain-Based Authentication Scheme for 5G Applications 2022 Ren, Lanfang
Forensic Analysis of Fitness Applications on Android 2022 Sinha, Rahul
Trojan Attacks and Defense for Speech Recognition 2022 Zong, Wei
A Systematic Literature Review on the Mobile Malware Detection Methods 2022 Kim, Yu-kyung
Detection of Business Email Compromise Attacks with Writing Style Analysis 2022 Vorobeva, Alisa
Development of Total Security Platform to Protect Autonomous Car and Intelligent Traffic System Under 5G Environment 2022 Lee, WonHaeng
Alle Artikel auflisten