共 46 条
[1]
AH JS Securit ZG AB, 2001, PROTECTED EXTENSIBLE
[2]
Ahmed A, 2016, PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16)
[3]
Mobile Edge Computing: Opportunities, solutions, and challenges
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2017, 70
:59-63
[4]
Allah BH, 2017, T MACH LEARN ARTIF I, V5
[5]
A Data Stream Processing Optimisation Framework for Edge Computing Applications
[J].
2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018),
2018,
:91-98
[7]
Cam-Winget N., 2007, The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)
[8]
Chang Z, 2017, IEEE GLOB COMM CONF
[9]
Clancy T, 2008, HANDOVER KEY MANAGEM
[10]
contributors W, 2020, AN PYTH DISTR