"Securing Our Bluetooth Mobiles From Intruder Attack Using Enhanced ..."

A. Rathika, R. Saranya, R. Iswarya (2010)

Details and statistics

DOI:

access: open

type: Informal or Other Publication

metadata version: 2018-08-13

a service of  Schloss Dagstuhl - Leibniz Center for Informatics