Abstract—For wearable devices with constrained computa- tional resources, it is typically required to offload processing tasks to more capable servers. However, this practice introduces vulnerabilities to data confidentiality and integrity due to...
This document is hosted externally.
Unless the owner has removed it from the web, you can access the full document via its original URL:
https://gala.gre.ac.uk/id/eprint/49194/7/49194%20WAQAS_An_Improved_Ultra-Lightweight_Anonymous_Authenticated_Key_Agreement_Protocol_For_Wearable_Devices_(AAM)_2024.pdfUnless the owner has removed it from the web, you can access the full document via its original URL:
See similar contracts (1)
Alternatively, you can try searching for similar contracts:
