Hindawi, Security and Communication Networks, 8(7), p. 1283-1291, 2013
DOI: 10.1002/sec.864
Export citation
Search in Google Scholar
Full text: Download