-
1by Boeira, Felipe Caye Batalha“... mechanisms counteract threats such as identity hijacking and packet tampering, an internal member who holds...”
Published 2018
Get full text
Others -
2by Boeira, Felipe Caye Batalha“... mechanisms counteract threats such as identity hijacking and packet tampering, an internal member who holds...”
Published 2018
Get full text
Others -
3by Boeira, Felipe Caye Batalha“... mechanisms counteract threats such as identity hijacking and packet tampering, an internal member who holds...”
Published 2018
Get full text
Others -
4by Antunes, Rodolfo Stoffel“... mechanisms tailored to fulfill requests for uniquely identified data objects not associated to a fixed...”
Published 2016
Get full text
Others -
5by Antunes, Rodolfo Stoffel“... mechanisms tailored to fulfill requests for uniquely identified data objects not associated to a fixed...”
Published 2016
Get full text
Others -
6by Antunes, Rodolfo Stoffel“... mechanisms tailored to fulfill requests for uniquely identified data objects not associated to a fixed...”
Published 2016
Get full text
Others