Login / Signup
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
Wei Ren
Linchen Yu
Liangli Ma
Yi Ren
Published in:
Int. J. Distributed Sens. Networks (2013)
Keyphrases
</>
statistical models
complex systems
mathematical models
information systems
bayesian networks
probabilistic model
markov chain
authentication mechanism