Security by Wireless or Why Play Fairer than the Attacker?
Main Author: | |
---|---|
Format: | Conference item |
Published: |
ACM‚ invited paper
2009
|
Main Author: | |
---|---|
Format: | Conference item |
Published: |
ACM‚ invited paper
2009
|