Login / Signup
A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks.
Mai A. Abdel-Malek
Kemal Akkaya
Arupjyoti Bhuyan
Ahmed S. Ibrahim
Published in:
IEEE Access (2022)
Keyphrases
</>
cooperative
social networks
complex networks
heterogeneous networks
network intrusion detection
anomaly detection
intrusion detection
security analysis
image authentication
particle swarm optimization
network structure
computer networks
user authentication
authentication scheme
document image retrieval