2016
DOI: 10.1007/s11227-016-1931-4
|View full text |Cite
|
Sign up to set email alerts
|

Erratum to: Secure IoT framework and 2D architecture for End-To-End security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The expectation values for all nodes are calculated for the choice of sending or not sending the data packets with Eqs. (8) and (9).…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The expectation values for all nodes are calculated for the choice of sending or not sending the data packets with Eqs. (8) and (9).…”
Section: System Modelmentioning
confidence: 99%
“…By increasing the number of such nodes, the network throughput and lifetime will reduce, and the energy consumption, average end-to-end delay, and network traffic will increase. As a result, it will disturb the network operation [7][8][9].…”
Section: Introductionmentioning
confidence: 99%