@dblp

A highly effective model for security protection against eavesdropping exploits.

, und . ICIS, Volume 403 von ACM International Conference Proceeding Series, Seite 891-895. ACM, (2009)

Links und Ressourcen

Tags