Audio-Based Security Techniques for Secure Device-to-Device Communications.
Dajiang ChenNing ZhangHuici WuKuan ZhangRongxing LuMohsen GuizaniPublished in: IEEE Netw. (2022)
Keyphrases
- security issues
- security requirements
- key management
- multimedia
- security properties
- virtual private network
- rfid tags
- encryption scheme
- key agreement protocol
- security model
- security level
- secure routing
- security measures
- security architecture
- security management
- authentication scheme
- security mechanisms
- network management
- network security