Login / Signup

Applying an auction optimization algorithm to mobile edge computing for security.

Yi WangTao TangFang JiangYaohua XuLiping LiRong Huang
Published in: IET Commun. (2022)
Keyphrases