Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Lecture Notes in Computer Science - Germany
doi 10.1007/11801412_8
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2006
Authors
Publisher
Springer Berlin Heidelberg