Showing 1 - 5 results of 5 for search 'GRAPHIC DESIGN THEORY', query time: 0.78s Refine Results
  1. 1
  2. 2
    .... To deal this sensitive issue, we design a novel blockchain enabled authentication key agreement protocol...
    Get full text
    Article
  3. 3
    ...></inline-formula>, which is extremely unfortunate careless design flaw and it leads to compromise...
    Get full text
    Article
  4. 4
    ..., it is essential to design provably secure and lightweight mutual authentication (MA) schemes for medical IoT...
    Get full text
    Article
  5. 5
    ... features. Moreover, some testbeds are described that were designed and implemented for the IoV environment...
    Get full text
    Article