Login / Signup

Protecting end-device from replay attack on LoRaWAN.

Woo-Jin SungHyeong-Geun AhnJong-Beom KimSeong-Gon Choi
Published in: ICACT (2018)
Keyphrases
  • databases
  • website
  • wide range
  • data acquisition
  • portable devices
  • database
  • inference control