//-->
Timing to block scanning malwares by using combinatorics proliferation model
Omote, Kazumasa, (2008)
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai, (2008)
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K., (2008)
Proposal for a privacy policy manager as architecture for a new privacy-enhancing platform
Takasaki, Haruo, (2017)
Offline peer-to-peer broadcast with anonymity
Kiyomoto, Shinsaku, (2011)