|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 1 scholarly publication.
Network architectures
Mobile devices
Network security
Internet
Telecommunications
Computer security
Databases