Author: Hutter Michael Plos Thomas Feldhofer Martin
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.5, Iss.2-3, 2010-03, pp. : 106-118
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract