Cited By
View all- Zhou ZWan YCui QYu KMumtaz SYang CGuizani M(2024)Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless NetworksIEEE Transactions on Wireless Communications10.1109/TWC.2023.327810823:1(423-435)Online publication date: 1-Jan-2024
- Illi EQaraqe MAlthunibat SAlhasanat AAlsafasfeh Mde Ree MMantas GRodriguez JAman WAl-Kuwari S(2024)Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2023.332732726:1(347-388)Online publication date: 1-Jan-2024
- Diamant RTomasin SArdizzon FEccher DCasari P(2023)Secret Key Generation From Route Propagation Delays for Underwater Acoustic NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.328004018(3318-3333)Online publication date: 1-Jan-2023
- Show More Cited By