Hindawi, Security and Communication Networks, 12(7), p. 2726-2727, 2014
DOI: 10.1002/sec.1175
Export citation
Search in Google Scholar
Full text: Download