Skip to main content

Authentication protocols in pervasive computing

Nguyen Hoang Long

Year
2010