Search results for: Yi Mu
Lecture Notes in Computer Science > Information and Communications Security > Authentication and Key Exchange > 16-30
Lecture Notes in Computer Science > Embedded and Ubiquitous Computing – EUC 2005 Workshops > The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005) > 835-844