%PDF-1.6
%
1 0 obj
<>stream
application/pdfIEEEIEEE Wireless Communications;2024;31;2;10.1109/MWC.2024.10495912Guest Editorial: Zero Trust Security Methods for Wireless NetworksMoayad AloqailyHelen PaikWillian T. LunardiCihan TuncFang He
IEEE Wireless Communications12 April 2024210.1109/MWC.2024.104959123113
VoR
endstream
endobj
2 0 obj
<>stream
H\͎0y
g=HHG@bHKpBId;l߷}7440cSש N]-Jv|osޏY'n9q?<Ӻ9˿Om~ov.]o8~v[\m.O^m|ͷ8Ư\a
q߄iߟBVZ#^,M8pl짬^ǗB5ޛU|N08w d
endstream
endobj
3 0 obj
<>
endobj
4 0 obj
<>/LastModified( D : 2 0 2 4 0 3 2 9 1 8 0 4 5 8 Z)/PageWidthList<0 585>>/PageItemUIDToLocationDataMap<0[3786 0 3 -251.5 -367.774 -35.0875 -342.72 1 0 0 1 111.962 -331.746]/1[3818 8 3 353.7 -368.5 543.9 -342.72 1 0 0 1 690.95 -332.472]/2[3934 7 3 -544.5 -367.774 -328.087 -342.72 1 0 0 1 -181.038 -331.746]/3[4507 1 3 61.7 366.5 252.5 376.5 1 0 0 1 148.1 371.5]/4[4532 2 3 -251.5 366.5 -219.7 376.5 1 0 0 1 -235.6 371.5]/5[4572 6 3 39.6 366.5 231.9 376.5 1 0 0 1 144 371.5]/6[4598 5 3 517.2 366.5 544.5 376.5 1 0 0 1 475.5 371.5]/7[4623 4 3 -232.8 366.5 -40.5 376.5 1 0 0 1 -144.9 371.5]/8[4649 3 3 -544.5 366.5 -512.7 376.5 1 0 0 1 -528.6 371.5]>>/NumberofPages 1/NumberOfPageItemsInPage 9/OriginalDocumentID( x m p . d i d : f 4 b 4 d 8 5 1 - 7 8 e 3 - 4 5 9 0 - a a 3 5 - c b b a 7 1 c 4 b 6 9 e)/DocumentID( x m p . d i d : 6 c d 8 8 3 2 8 - 0 7 a c - 4 a d 3 - b a 2 2 - d 0 5 1 a 2 4 7 8 b 4 f)/PageUIDList<0 486>>>>>>/Resources<>/ExtGState<>/ProcSet[/PDF/Text]/Font<>/XObject<>>>/CropBox[36 36 620.76 818.76]/Parent 15 0 R/Rotate 0/MediaBox[0 0 656.76 854.76]/TrimBox[36 36 620.76 818.76]>>
endobj
5 0 obj
<>stream
HWmoۺ_/lR%;v(]t7FFmʢ*QI_mwhdRÇ9^ض:ë}Į?0Y-<
K6g,X)6go~if9ۈ/f*l~Nogx6^qv>3CS\,ْ-/ȝyt8G(
ٌs~f+-d|.3e8
lZI;N2Qѕ]~!LS;.EU-;2;#`j3#67 XqS^
ZK(UBva1Q*.J79GKVkɟ8:2܊\k!
Ѣ\VZ&dޕYs(00HespY0gcRL=_h5Ov](%iV4ΤTĽ/ǀIX}JۺICcw;UbU"I"FưKA|Ty2,B1Ox%}cۼT0P-PHȴ-F)EdWj_p$˞ٱe%2pg4Zb QqLYԚ=*FĬN!MxH (A&zX霾y_Ltͳ_FQz
{{}pjF:f`磙nfjC#x>S0o(䂒k$ާ"ꋠK|S[a*6zfD6N
@v+uNV{mlq:=r\Qyuc