Enthralling 发表于 2025-4-1 03:17:04

http://reply.papertrans.cn/48/4747/474633/474633_61.png

粗俗人 发表于 2025-4-1 09:04:11

http://reply.papertrans.cn/48/4747/474633/474633_62.png

mydriatic 发表于 2025-4-1 13:30:08

Secure Trust-Based Group Key Generation Algorithm for Heterogeneous Mobile Wireless Sensor Networksster to another cluster, protected cluster preservation is performed, and when the data requires to broadcast from source node to sink node, the protected route detection will be implemented inside the clusters. The simulation results show that the proposed scheme is more protected and reduces the n

违法事实 发表于 2025-4-1 17:25:18

http://reply.papertrans.cn/48/4747/474633/474633_64.png

implore 发表于 2025-4-1 19:47:45

http://reply.papertrans.cn/48/4747/474633/474633_65.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Inventive Computation and Information Technologies; Proceedings of ICICI S. Smys,Valentina Emilia Balas,Pavel Lafata Conference proceedings