Detecting Impersonation Attacks in Future Wireless and Mobile Networks

Lecture Notes in Computer Science - Germany
doi 10.1007/11801412_8
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg