Showing 1 - 10 results of 10 for search '"Adversarial Modeling"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3

    ID-based wireless authentication scheme with anonymity by ZHU Hui, LI Hui, SHU Wan-li, WANG Yu-min

    Published 2009-01-01
    Subjects: “…unauthenticated-links adversarial model…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10