@dblp

Offloading personal security applications to the Network Edge: A mobile user case scenario.

, and . IWCMC, page 96-101. IEEE, (2016)

Links and resources

Tags