Springer, Lecture Notes in Computer Science, p. 63-74, 2005
DOI: 10.1007/11599548_6
Elsevier, Computers and Security, 5(28), p. 310-324
DOI: 10.1016/j.cose.2008.10.001
Export citation
Search in Google Scholar
Full text: Download