|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 4 scholarly publications.
Network security
Information security
Computer security
Cell phones
Networks
Binary data
Mobile communications