Cited By
View all- Babamir SNowrouzi RNaseri H(2010)Mining Bluetooth Attacks in Smart PhonesNetworked Digital Technologies10.1007/978-3-642-14292-5_26(241-253)Online publication date: 2010
- Zhang XXie YLai XZhang SDeng Z(2007)A multi-core security architecture based on EFIProceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II10.5555/1784707.1784760(1675-1687)Online publication date: 25-Nov-2007
- Zhang XXie YLai XZhang SDeng Z(2007)A Multi-core Security Architecture Based on EFIOn the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS10.1007/978-3-540-76843-2_39(1675-1687)Online publication date: 2007