↓ Skip to main content

Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems

Overview of attention for book
Attention for Chapter 3: Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
16 Mendeley