"Mobile Security: Game Theory."

Chadi Assi et al. (2008)

Details and statistics

DOI: 10.1081/E-EWMC-120043182

access: closed

type: Reference Work

metadata version: 2017-07-12

a service of  Schloss Dagstuhl - Leibniz Center for Informatics