Springer, International Journal of Information Security, 4(6), p. 197-211, 2007
DOI: 10.1007/s10207-006-0010-x
Export citation
Search in Google Scholar
Full text: Download