-
1
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: Get full text
Article -
2
Endogenous security in the physical layer of wireless communications: key technologies, advantages and future challenges
Published 2024-10-01Subjects: Get full text
Article