|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
Sensor networks
Computer security
Network security
Information security
Data processing
Cryptography
Network architectures