• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4602211)   Today's Articles (3574)   Subscriber (49367)
For: Liu CL, Xie K, Miao Y, Zha XF, Feng ZJ, Lee J. Study on the communication method for chaotic encryption in remote monitoring systems. Soft comput 2005. [DOI: 10.1007/s00500-005-0475-y] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
Number Cited by Other Article(s)
1
Meshram C, Lee CC, Li CT, Chen CL. A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft comput 2016. [DOI: 10.1007/s00500-016-2440-3] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA