C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Design and analysis on trusted network equipment access authentication protocol.
Yingxu Lai
Yinong Chen
Qichen Zou
Zenghui Liu
Zhen Yang
Published in:
Simul. Model. Pract. Theory (2015)
Keyphrases
</>
authentication protocol
data analysis
data sets
network traffic
wireless sensor networks
distributed systems