Institution of Engineering and Technology, IET Information Security, 3(11), p. 139-145
DOI: 10.1049/iet-ifs.2016.0060
Export citation
Search in Google Scholar
Full text: Unavailable