Chapter
Cryptology and Network Security, 2014, Volume 8813
ISBN : 978-3-319-12279-3
Conference Paper
Conference: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Year: 2017, Page 87
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2016, Volume 9610, Page 111
DOI: 10.1007/978-3-319-29485-8_7
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2018, Volume 10808, Page 319
DOI: 10.1007/978-3-319-76953-0_17
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2021, Volume 12710, Page 301
DOI: 10.1007/978-3-030-75245-3_12
Read OnlineArticle
Journal: IEEE Transactions on Information Forensics and Security, 2021, Volume 16, Page 2260
DOI: 10.1109/TIFS.2021.3051801
Read OnlineArticle
Journal: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2017, Volume E100.A, Number 9, Page 1825
DOI: 10.1587/transfun.E100.A.1825
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2020, Volume 12006, Page 391
DOI: 10.1007/978-3-030-40186-3_17
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2016, Volume 10052, Page 228
DOI: 10.1007/978-3-319-48965-0_14
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2021, Volume 12809, Page 417
DOI: 10.1007/978-3-030-81645-2_24
Read Online