A case study of impersonation from a security systems point of view

Authors

  • Elisabeth Zetterholm
  • Daniel Elenius
  • Mats Blomberg

Downloads

Published

2009-11-18

Issue

Section

Articles