

Author: Koong Kai S. Liu Lai C. Bai Shuming Lin Binshan
Publisher: Inderscience Publishers
ISSN: 1470-949X
Source: International Journal of Mobile Communications, Vol.6, Iss.2, 2008-01, pp. : 199-216
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






The threat to identity from new and unknown malware
By Hodgson P
BT Technology Journal, Vol. 23, Iss. 4, 2005-10 ,pp. :


Belonging: From identity logic to relational logic
Continuum: Journal of Media & Cultural Studies, Vol. 25, Iss. 3, 2011-06 ,pp. :