Efficient Security Protocols for Constrained Devices

Research output: ThesisDoctoral Thesis (compilation)

466 Downloads (Pure)

Fingerprint

Dive into the research topics of 'Efficient Security Protocols for Constrained Devices'. Together they form a unique fingerprint.

Computer Science