共 50 条
- [1] Advances on Elastic Traffic via M2M Satellite User Terminals [J]. 2015 12TH INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS), 2015,
- [2] Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (04): : 543 - 558
- [3] The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 131 - 146
- [4] A M2M Network-Based Realistic Mobile User Movement Prediction in Emergencies [J]. 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,
- [6] A Distributed Authentication and Key Exchange Approach for Secure M2M Communications [J]. PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 277 - 280
- [9] Experimental Evaluation of Mobile Core Networks on Simultaneous Access from M2M/IoT Terminals [J]. 33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 13 - 18
- [10] A trust-based offloading for mobile M2M communications [J]. 2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 1139 - 1143