Secure Protocols for Location, Adjacency, and Identity Verification: Cross Layer Techniques
Secure Protocols for Location, Adjacency, and Identity Verification: Cross Layer Techniques
How can we combine identity authentication and location authentication?