Hindawi, Security and Communication Networks, 9(9), p. 862-873, 2014
DOI: 10.1002/sec.932
Export citation
Search in Google Scholar
Full text: Download