Login / Signup
Design and analysis on trusted network equipment access authentication protocol.
Yingxu Lai
Yinong Chen
Qichen Zou
Zenghui Liu
Zhen Yang
Published in:
Simul. Model. Pract. Theory (2015)
Keyphrases
</>
authentication protocol
data analysis
data sets
network traffic
wireless sensor networks
distributed systems