9
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      On Secure Wireless Communications for IoT Under Eavesdropper Collusion

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references33

          • Record: found
          • Abstract: not found
          • Article: not found

          Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior

            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            Wireless Communications

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Algorithms for quantum computation: discrete logarithms and factoring

              P.W. Shor (2024)
                Bookmark

                Author and article information

                Journal
                IEEE Transactions on Automation Science and Engineering
                IEEE Trans. Automat. Sci. Eng.
                Institute of Electrical and Electronics Engineers (IEEE)
                1545-5955
                1558-3783
                July 2016
                July 2016
                : 13
                : 3
                : 1281-1293
                Article
                10.1109/TASE.2015.2497663
                2a480f6e-9396-44ca-aaec-0dfaa4137104
                © 2016
                History

                Comments

                Comment on this article