共 50 条
- [32] Securing RSMA-Based Communications at Physical Layer [J]. IEEE NETWORK, 2024, 38 (02): : 211 - 217
- [33] Investigating and Securing Communications in the Controller Area Network (CAN) [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 814 - 818
- [34] Securing spontaneous communications in wireless pervasive computing environments [J]. ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 662 - 667
- [35] Towards Securing Communications in Infrastructure-Poor Areas [J]. E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, AFRICOMM 2013, 2014, 135 : 59 - +
- [36] Securing the manufacturing environment using biometrics [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 275 - 278
- [37] Securing Intellectual Assets in a Global Environment [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 3166 - 3176
- [38] IoTURVA: Securing Device-to-Device Communications for IoT [J]. PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17), 2017, : 552 - 554
- [39] Securing Visible Light Communications via Friendly Jamming [J]. 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 524 - 529
- [40] A Token-based Protocol for Securing MQTT Communications [J]. 2018 26TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2018, : 246 - 251