Authentication in Insecure Environments, p. 1-5
DOI: 10.1007/978-3-658-07116-5_1
Export citation
Search in Google Scholar
Full text: Unavailable