Elsevier, Journal of Information Security and Applications, 2(19), p. 103-104, 2014
DOI: 10.1016/j.jisa.2014.06.002
Export citation
Search in Google Scholar
Full text: Unavailable