Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services

Logic Journal of the IGPL 24 (4) (2016)
  Copy   BIBTEX

Abstract

This article has no associated abstract. (fix it)

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 90,616

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Theft in a wireless world.Luc Small - 2007 - Ethics and Information Technology 9 (3):179-186.

Analytics

Added to PP
2016-06-30

Downloads
24 (#563,024)

6 months
1 (#1,040,386)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references