Erickson, David March 21, 2011 | Athow, Desire May 22, 2010 |
---|---|
Poundstone, William May 21, 2003 | Thomlinson, Matt July 1, 2014 |
Miller, Michael August 1, 1998.
25Beaumont, Claudine June 27, 2008 | |
---|---|
The shifting security assumptions of pervasive computing" | Retrieved on August 25, 2013 |
Mintz, Jessica October 22, 2009.
6Wild, Chris August 24, 2015 | National Telecommunications and Information Administration |
---|---|
Meisner, Jeffrey August 23, 2012 | Mason, Rowena September 10, 2008 |
Markoff, John June 20, 2002.
10