Cited By
View all- Verma PVerma RPrakash AAgrawal ANaik KTripathi RAlsabaan MKhalifa TAbdelkader TAbogharaf A(2016)Machine-to-Machine (M2M) communicationsJournal of Network and Computer Applications10.1016/j.jnca.2016.02.01666:C(83-105)Online publication date: 1-May-2016
- Avoine GCoisel IMartin TKrunz MLazos LDi Pietro RTrappe W(2012)A privacy-restoring mechanism for offline RFID systemsProceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks10.1145/2185448.2185458(63-74)Online publication date: 16-Apr-2012
- Wang ZNascimento MMacGregor MBorges de Araujo RBoukerche APazzi R(2011)Towards end-to-end routing for periodic mobile objectsProceedings of the first ACM international symposium on Design and analysis of intelligent vehicular networks and applications10.1145/2069000.2069012(61-68)Online publication date: 4-Nov-2011
- Show More Cited By