@dblp

A highly effective model for security protection against eavesdropping exploits.

, and . ICIS, volume 403 of ACM International Conference Proceeding Series, page 891-895. ACM, (2009)

Links and resources

Tags