Sciweavers

11 search results - page 3 / 3
» A Dependable Architecture for COTS-Based Software Systems Us...
Sort
View
MSWIM
2006
ACM
13 years 10 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt