News
The limited drone nodes, data storage, computing and communication capabilities necessitate the need to design an effective and secure authentication scheme. Recently, research has proposed remote ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results