Login / Signup
Protecting end-device from replay attack on LoRaWAN.
Woo-Jin Sung
Hyeong-Geun Ahn
Jong-Beom Kim
Seong-Gon Choi
Published in:
ICACT (2018)
Keyphrases
</>
databases
website
wide range
data acquisition
portable devices
database
inference control