Springer, Lecture Notes in Computer Science, p. 208-223, 2012
DOI: 10.1007/978-3-642-30955-7_18
Elsevier, Information Security Technical Report, 3(17), p. 71-80
DOI: 10.1016/j.istr.2012.10.006
Export citation
Search in Google Scholar
Full text: Download