modeling
Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things
2014| Vol. 10 (3) | Open Call Articles| Pages: 179-187| PDF (1.42 MiB) | 2017-03-16 |0 views| 0 CrossRef citationsThe Two-Step P2P Simulation Approach
2005| Vol. 1 (1) | Open Call Articles| Pages: 4-12| PDF (870 KiB) | 2017-04-06 |0 views| 1 CrossRef citation