Institution of Engineering and Technology, IET Information Security, 1(11), p. 46-53
DOI: 10.1049/iet-ifs.2015.0427
Export citation
Search in Google Scholar
Full text: Unavailable