Login / Signup
Designing and verifying a P2P service security protocol in M2M environment.
Woo-Sik Bae
Published in:
Peer-to-Peer Netw. Appl. (2016)
Keyphrases
</>
security protocols
security services
computing environments
peer to peer
real time
resource discovery
artificial immune algorithm
service providers
mobile devices
context aware
service discovery
authentication protocol
fully distributed