Your selections:
Massive multiple access based on superposition raptor codes for M2M communications
- Shirvanimoghaddam, Mahyar, Dohler, Mischa, Johnson, Sarah J.
Enabling technologies for effective deployment of Internet of Thing (IoT) systems: a communication networking perspective
- Khan, Jamil Y., Chen, Dong, Hulin, Oliver
On the fundamental limits of random non-orthogonal multiple access in cellular massive IoT
- Shirvanimoghaddam, Mahyar, Condoluci, Massimo, Dohler, Mischa, Johnson, Sarah
Policy-based access control for constrained healthcare resources in the context of the Internet of Things
- Pal, Shantanu, Hitchens, Michael, Varadharajan, Vijay, Rabehaja, Tahiry
Multiple access technologies for cellular M2M communications
- Shirvanimoghaddam, Mahyar, Johnson, Sarah J.
On the integration of blockchain to the Internet of Things for enabling access right delegation
- Pal, Shantanu, Rabehaja, Tahiry, Hill, Ambrose, Hitchens, Michael, Varadharajan, Vijay
An Overview of the Internet of Things (IoT) Applications in the Health Sector in Saudi Arabi
- Masmali, Feisal Hadi, Miah, Shah Jahan, Noman, Nasimul
SDPM: a secure smart device provisioning and monitoring service architecture for smart network infrastructure
- Karmakar, Kallol Krishna, Varadharajan, Vijay, Speirs, Pete, Hitchens, Michael, Robertson, Aron
Targeted Context-Based Attacks on Trust Management Systems in IoT
- Lewis, Cody, Li, Nan, Varadharajan, Vijay
Are you sure you would like to clear your session, including search history and login status?