Login / Signup
Five Years Later: How Effective Is the MAC Randomization in Practice? The No-at-All Attack.
Ivan Vasilevski
Dobre Blazhevski
Veno Pachovski
Irena Stojmenovska
Published in:
ICT Innovations (2019)
Keyphrases
</>
databases
privacy preserving
years ago
wireless sensor networks
cost effective
smart card