Published in

Authentication in Insecure Environments, p. 209-212

DOI: 10.1007/978-3-658-07116-5_7

Authentication in Insecure Environments, p. 81-86

DOI: 10.1007/978-3-658-07116-5_3

Links

Tools

Export citation

Search in Google Scholar

Introduction, Scenario, and Related Work

Book chapter published in 2014 by Sebastian Pape
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO