Login / Signup

Exploiting Access Control Information in User Profiles to Reconfigure User Equipment.

Giovanni BartolomeoStefano SalsanoNicola Blefari-Melazzi
Published in: MobiQuitous (2006)
Keyphrases