Inproceedings,

Securing D2D Wireless Links by Continuous Authenticity with Legitimacy Patterns.

, and .
HICSS, page 5763-5771. IEEE Computer Society, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews