Wiley Open Access, IET Information Security, 3(7), p. 221-229, 2013
DOI: 10.1049/iet-ifs.2011.0360
Export citation
Search in Google Scholar
Full text: Unavailable