Book Reviews
暂无分享,去创建一个
[1] Antonio F. Gómez-Skarmeta,et al. Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .
[2] Caidan Zhao,et al. Compressed Sensing Based Fingerprint Identification for Wireless Transmitters , 2014, TheScientificWorldJournal.
[3] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[4] Xiaojiang Du,et al. Modeling and Optimizing the LTE Discontinuous Reception Mechanism Under Self-Similar Traffic , 2016, IEEE Transactions on Vehicular Technology.
[5] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[6] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[7] Mahdy Saedy,et al. Ad Hoc M2M communications and security based on 4G cellular system , 2011, 2011 Wireless Telecommunications Symposium (WTS).
[8] Xuemin Shen,et al. Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions , 2015, IEEE Communications Magazine.
[9] Tarik Taleb,et al. Machine-type communications: current status and future perspectives toward 5G systems , 2015, IEEE Communications Magazine.
[10] Tapio Fabritius,et al. A multi-purpose triangular framework for M2M communication security , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).