Publication | Closed Access
An efficient and provable certificate-based proxy signature scheme for IIoT environment
43
Citations
19
References
2020
Year
Public Key InfrastructureEngineeringDigital SignatureAuthentication ProtocolInformation SecurityCryptographic ProtectionComputer EngineeringIiot EnvironmentFormal VerificationSecure ProtocolData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1