CITATION STYLE
Schmidt, A. U., & Kuntze, N. (2008). Trusted Computing in mobiler Anwendung: Von Zugangskontrolle zu Identitäten. In Trusted Computing (pp. 187–206). Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9452-6_14
Mendeley helps you to discover research relevant for your work.