Found: 2
Select item for more details and to access through your institution.
How to protect security and privacy in the IoT: a policy-based RFID tag management protocol.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 12, p. 2669, doi. 10.1002/sec.400
- By:
- Publication type:
- Article
Cyber Awareness Exercises: Virtual vs On-site Participation & the Hybrid Approach.
- Published in:
- International Journal of Information Security & Cybercrime, 2021, v. 10, n. 2, p. 31, doi. 10.19107/ijisc.2021.02.04
- By:
- Publication type:
- Article