Login / Signup

Embedding the MRC and SC Schemes into Trust Management Algorithm Applied to IoT Security Protection.

Joy Iong-Zong Chen
Published in: Wirel. Pers. Commun. (2018)
Keyphrases
  • management system
  • expectation maximization
  • databases
  • case study
  • trust management
  • security protection