Modeling

Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things/Open Call Articles
The Two-Step P2P Simulation Approach/Open Call Articles