has been cited by the following article(s):
[1]
|
Research on Identity Authentication of IoT Devices based on Blockchain
2022 IEEE 4th International Conference on Power, Intelligent Computing and Systems (ICPICS),
2022
DOI:10.1109/ICPICS55264.2022.9873707
|
|
|
[2]
|
Employees’ aptitudes and trepidations for the adoption of enterprise application architecture for supply chain management in small and medium enterprises: A case of Capricorn District Municipality
Journal of Transport and Supply Chain Management,
2022
DOI:10.4102/jtscm.v16i0.708
|
|
|
[3]
|
Network Security Threat Situation Recognition Based on Attack and Defense Game Model
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/2037/1/012126
|
|
|
[4]
|
Application of AES and DES Algorithms in File Management
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/2037/1/012001
|
|
|