![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Ad Hoc Networks, Volume 95
Volume 95, December 2019
- Emma Fitzgerald, Michal Pióro, Artur Tomaszewski
:
Network lifetime maximization in wireless mesh networks for machine-to-machine communication. - Hua Guo, Ya Gao, Tongge Xu, Xiyong Zhang, Jianfeng Ye:
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.
- Jiayan Zhang, Fei Li, Haoxi Zhang
, Ruxiang Li, Yalin Li:
Intrusion detection system using deep learning for in-vehicle security.
- Christoph Sommer
, Stefano Basagni:
Advances and novel applications of mobile wireless networking.
- Tongzhen Si, Zhong Zhang, Shuang Liu:
Compact Triplet Loss for person re-identification in camera sensor networks.
- Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb
, Mohammad Hammoudeh
, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. - Nasir N. Hurrah
, Shabir A. Parah
, Javaid A. Sheikh
, Fadi Al-Turjman, Khan Muhammad
:
Secure data transmission framework for confidentiality in IoTs.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.