Hindawi, Security and Communication Networks, 10(7), p. 1543-1551, 2013
DOI: 10.1002/sec.788
Export citation
Search in Google Scholar
Full text: Download