dc.date.accessioned |
2018-09-24T12:59:57Z |
|
dc.date.available |
2018-09-24T12:59:57Z |
|
dc.date.copyright |
2008 |
en_US |
dc.date.issued |
2018-09-24 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/8513 |
|
dc.language.iso |
en |
en_US |
dc.title |
Encyclopedia of Wireless and Mobile Communications |
en_US |
dc.type |
Book / Chapter of a Book |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
200904853 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references |
en_US |
dc.identifier.ctation |
Debbabi, M., Laverdière, M. A., Mourad, A., & Tlili, S. (2008). Wireless Applications: Middleware Security. In Encyclopedia of wireless and mobile communications (pp.1240-1250) |
en_US |
dc.chapter.author |
Debbabi, Mourad |
|
dc.chapter.author |
Laverdiere, Marc-Andre |
|
dc.chapter.author |
Mourad, Azzam |
|
dc.chapter.author |
Tlili, Syrine |
|
dc.author.email |
azzam.mourad@lau.edu.lb |
en_US |
dc.chapter.pages |
1242-1250 |
en_US |
dc.chapter.title |
Wireless applications: middleware security |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://www.researchgate.net/publication/258225120_Wireless_Applications_Middleware_Security |
en_US |
dc.publication.date |
2008 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |