Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services

Logic Journal of the IGPL 24 (4) (2016)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,592

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Theft in a wireless world.Luc Small - 2007 - Ethics and Information Technology 9 (3):179-186.

Analytics

Added to PP
2016-06-30

Downloads
28 (#565,512)

6 months
4 (#779,041)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references