2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing
DOI: 10.1109/nswctc.2010.126
Export citation
Search in Google Scholar
Full text: Unavailable