Login / Signup

How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.

Wei RenLinchen YuLiangli MaYi Ren
Published in: Int. J. Distributed Sens. Networks (2013)
Keyphrases
  • statistical models
  • complex systems
  • mathematical models
  • information systems
  • bayesian networks
  • probabilistic model
  • markov chain
  • authentication mechanism