Showing 1 - 3 results of 3 for search '"adversary modeling"', query time: 0.02s Refine Results
  1. 1
  2. 2

    ID-based wireless authentication scheme with anonymity by ZHU Hui, LI Hui, SHU Wan-li, WANG Yu-min

    Published 2009-01-01
    Subjects: “…unauthenticated-links adversarial model…”
    Get full text
    Article
  3. 3