@dblp

Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services.

, , , , , and . Log. J. IGPL, 24 (1): 80-91 (2016)

Links and resources

Tags