Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

1 Array
hal_authIdPerson_i : 999020
Image document

Secure and Authenticated Access to LLN Resources Through Policy Constraints

Konstantinos Rantos , Konstantinos Fysarakis , Othonas Soultatos , Ioannis Askoxylakis
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.271-280, ⟨10.1007/978-3-319-24018-3_18⟩
Conference papers hal-01442549v1