"Must security listen to Kokoro?"

Karmele López de Ipiña et al. (2011)

Details and statistics

DOI: 10.1109/CCST.2011.6095944

access: closed

type: Conference or Workshop Paper

metadata version: 2021-07-25

a service of  Schloss Dagstuhl - Leibniz Center for Informatics