1
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
2
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
3
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
4
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
5
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
6
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
7
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
8
Autores Estella Periutella W., Marina Torrente A.
Publicado 2011-12-21
Palabra clave:
“...security requirements...”Publicado 2011-12-21
9
10
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
11
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
12
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
13
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
14
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
15
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
16
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
17
Palabra clave:
“...Protocol, IoT, Security module, QR technology, Access control, Hardware, Real-time application....”
18
Autores Benavides Vanegas, Farid Samir
Publicado 2011-06-15
Descripción:
“... to be understood as the opposite to security? In this paper I want to make sense of the first two questions...”Publicado 2011-06-15