共 50 条
- [41] Mobile computing by deploying agents TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 127 - 130
- [42] Deploying IN services in a mobile environment INTELLIGENT NETWORKS AND INTELLIGENCE IN NETWORKS, 1997, : 464 - 479
- [43] EnGarde: Protecting the mobile phone from malicious NFC interactions MobiSys 2013 - Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services, 2013, : 445 - 458
- [44] NFC-based mobile application design restaurant ordering system APP PROCEEDINGS OF 4TH IEEE INTERNATIONAL CONFERENCE ON APPLIED SYSTEM INNOVATION 2018 ( IEEE ICASI 2018 ), 2018, : 737 - 740
- [45] Design and implementation of NFC-based mobile coupon for small traders and enterprisers 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
- [46] To Monitor or Not: Lessons from Deploying Wireless Sensor Networks in Data Centers PROCEEDINGS OF THE 7TH INTERNATIONAL WORKSHOP ON REAL-WORLD EMBEDDED WIRELESS SYSTEMS AND NETWORKS (REALWSN'18), 2018, : 43 - 48
- [49] Securing NFC Credit Card Payments Against Malicious Retailers NETWORKED SYSTEMS, NETYS 2016, 2016, 9944 : 214 - 228
- [50] Lessons Learned from Building and Deploying a Code Review Analytics Platform 12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), 2015, : 191 - 201