Hindawi, Security and Communication Networks, 15(8), p. 2524-2535, 2015
DOI: 10.1002/sec.1194
Export citation
Search in Google Scholar
Full text: Download