Login / Signup
Embedding the MRC and SC Schemes into Trust Management Algorithm Applied to IoT Security Protection.
Joy Iong-Zong Chen
Published in:
Wirel. Pers. Commun. (2018)
Keyphrases
</>
management system
expectation maximization
databases
case study
trust management
security protection