has been cited by the following article(s):
[1]
|
Preventing and securing data from cyber crime using new authentication method based on block cipher scheme
2017 2nd International Conference on Anti-Cyber Crimes (ICACC),
2017
DOI:10.1109/Anti-Cybercrime.2017.7905274
|
|
|
[2]
|
Deployment of Hash Function to Enhance Message Integrity in Wireless Body Area Network (WBAN)
International Journal of Communications, Network and System Sciences,
2016
DOI:10.4236/ijcns.2016.912047
|
|
|
[3]
|
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
International Journal of Communications, Network and System Sciences,
2016
DOI:10.4236/ijcns.2016.912046
|
|
|