Two methods of authenticated positioning

Thomas Mundt. Two methods of authenticated positioning. In Azzedine Boukerche, Hsiao-Hwa Chen, Mirela Sechi Moretti Annoni Notare, editors, Q2SWinet 06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos, Spain, October 2, 2006. pages 25-32, ACM, 2006. [doi]

@inproceedings{Mundt06,
  title = {Two methods of authenticated positioning},
  author = {Thomas Mundt},
  year = {2006},
  doi = {10.1145/1163673.1163678},
  url = {http://doi.acm.org/10.1145/1163673.1163678},
  researchr = {https://researchr.org/publication/Mundt06},
  cites = {0},
  citedby = {0},
  pages = {25-32},
  booktitle = {Q2SWinet 06 - Proceedings of the Second ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Terromolinos, Spain, October 2, 2006},
  editor = {Azzedine Boukerche and Hsiao-Hwa Chen and Mirela Sechi Moretti Annoni Notare},
  publisher = {ACM},
  isbn = {1-59593-486-3},
}