Springer, International Journal of Information Security, 3(10), p. 137-153, 2011
DOI: 10.1007/s10207-011-0123-8
Export citation
Search in Google Scholar
Full text: Download