Authentication in constrained settings

From MaRDI portal
Publication:2947097

DOI10.1007/978-3-319-21356-9_1zbMATH Open1401.94187OpenAlexW2294403897MaRDI QIDQ2947097FDOQ2947097


Authors: Aikaterini Mitrokotsa Edit this on Wikidata


Publication date: 21 September 2015

Published in: Cryptography and Information Security in the Balkans (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-319-21356-9_1




Recommendations



Cites Work


Cited In (2)





This page was built for publication: Authentication in constrained settings

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2947097)