modeling
Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
2014| Vol. 10 (3) | Open Call Articles| Pages: 179-187| PDF (1.42 MiB) | 2017-03-16 |6 views| 1 CrossRef citationThe Two-Step P2P Simulation Approach
2005| Vol. 1 (1) | Open Call Articles| Pages: 4-12| PDF (870 KiB) | 2017-04-06 |7 views| 1 CrossRef citation