Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography
Crossref DOI link: https://doi.org/10.1007/978-3-030-18075-1_3
Published Online: 2019-05-31
Published Print: 2019
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Khodjaeva, Matluba
Obaidat, Muath
Salane, Douglas
Text and Data Mining valid from 2019-01-01
Chapter History
First Online: 31 May 2019