• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Shin Y, Jeon S. MQTree: Secure OTA Protocol Using MQTT and MerkleTree. Sensors (Basel) 2024;24:1447. [PMID: 38474983 DOI: 10.3390/s24051447] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/29/2024] [Revised: 02/18/2024] [Accepted: 02/20/2024] [Indexed: 03/14/2024]
2
Fu M, Zhang C, Hu C, Wu T, Dong J, Zhu L. Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains. Entropy (Basel) 2023;25:1058. [PMID: 37510005 PMCID: PMC10378298 DOI: 10.3390/e25071058] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/30/2023] [Revised: 07/07/2023] [Accepted: 07/11/2023] [Indexed: 07/30/2023]
3
Zhao Y, Tian B, Niu Y, Zhang H, Yi Z, Zeng R. A Security Management and Control Solution of Smart Park Based on Sensor Networks. Sensors (Basel) 2021;21:6815. [PMID: 34696029 DOI: 10.3390/s21206815] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/07/2021] [Revised: 09/27/2021] [Accepted: 10/01/2021] [Indexed: 11/23/2022]
4
Zajac P. Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications. Sensors (Basel) 2021;21:2036. [PMID: 33805694 DOI: 10.3390/s21062036] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/03/2021] [Revised: 03/01/2021] [Accepted: 03/09/2021] [Indexed: 11/16/2022]
5
Yin X, He J, Guo Y, Han D, Li KC, Castiglione A. An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree. Sensors (Basel) 2020;20:E5735. [PMID: 33050225 DOI: 10.3390/s20205735] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/25/2020] [Revised: 09/18/2020] [Accepted: 09/30/2020] [Indexed: 11/17/2022]
6
Ji Y, Zhang J, Ma J, Yang C, Yao X. BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. J Med Syst 2018;42:147. [PMID: 29961160 DOI: 10.1007/s10916-018-0998-2] [Citation(s) in RCA: 71] [Impact Index Per Article: 11.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/28/2018] [Accepted: 06/18/2018] [Indexed: 11/24/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA