Journal of Hardware and Systems Security, 3(1), p. 201-202
DOI: 10.1007/s41635-017-0019-9
Export citation
Search in Google Scholar
Full text: Download