Login / Signup

Design and analysis on trusted network equipment access authentication protocol.

Yingxu LaiYinong ChenQichen ZouZenghui LiuZhen Yang
Published in: Simul. Model. Pract. Theory (2015)
Keyphrases
  • authentication protocol
  • data analysis
  • data sets
  • network traffic
  • wireless sensor networks
  • distributed systems