Elsevier, Computers and Security, 8(11), p. 733-745
DOI: 10.1016/0167-4048(92)90129-f
Export citation
Search in Google Scholar
Full text: Unavailable