N&N Global Technology, International Journal of Information Security, 4(10), p. 255-266
DOI: 10.1007/s10207-011-0135-4
Export citation
Search in Google Scholar
Full text: Download