Inproceedings,

An efficient security algorithm in mobile computing for resource constrained mobile devices.

, and .
Q2SWinet, page 113-114. ACM, (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews