A Malicious Node Identification Method Based on Edge Computing
暂无分享,去创建一个
Wen Hong | Jiang Yixin | Xu Aidong | Yi Chen | Jinran Du | Yunan Zhang | Minggui Cao | Liao Runfa
[1] Hong Wen,et al. Lightweight one-time password authentication scheme based on radio-frequency fingerprinting , 2018, IET Commun..
[2] Yushan Li,et al. Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.
[3] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[4] Hong Wen,et al. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing , 2019, IEEE Transactions on Cloud Computing.
[5] Ming Xiao,et al. Clone Detection Based on Physical Layer Reputation for Proximity Service , 2019, IEEE Access.
[6] Hong Wen,et al. Internet of Things Based Smart Grids Supported by Intelligent Edge Computing , 2019, IEEE Access.
[7] Xianbin Wang,et al. Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization , 2016, IEEE Transactions on Wireless Communications.
[8] Ming Xiao,et al. Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions , 2018, IEEE Industrial Electronics Magazine.
[9] Hong Wen,et al. Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels , 2018, IEEE Wireless Communications Letters.
[10] Hong Wen,et al. Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.