"Attacker Placement for Detecting Vulnerabilities of Pseudonym Change ..."

Ikjot Saini, Sherif Saad Ahmed, Arunita Jaekel (2018)

Details and statistics

DOI: 10.1109/VTCFALL.2018.8690701

access: closed

type: Conference or Workshop Paper

metadata version: 2021-12-20

a service of  Schloss Dagstuhl - Leibniz Center for Informatics