Cited By
View all- Chawla KRobins G(2013)Addressing Covert Channel Attacks in RFID-Enabled Supply ChainsAdvanced Security and Privacy for RFID Technologies10.4018/978-1-4666-3685-9.ch011(176-190)Online publication date: 2013
- Cheng Zhao Dawei Jin Gang Chen Wenning Hao Lei Song Min Zhao (2013)Intelligent traffic service based on cloud computing2013 IEEE 4th International Conference on Software Engineering and Service Science10.1109/ICSESS.2013.6615313(313-316)Online publication date: May-2013
- Wang ZZhang XChen Z(2012)RapdosProceedings of the 2012 Fourth International Conference on Computational and Information Sciences10.1109/ICCIS.2012.215(1042-1045)Online publication date: 17-Aug-2012
- Show More Cited By