

Publisher: IGI Global_journal
E-ISSN: 1930-1669|1|2|37-60
ISSN: 1930-1650
Source: International Journal of Information Security and Privacy (IJISP), Vol.1, Iss.2, 2007-04, pp. : 37-60
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








By Choi Namjoo Kim Dan Goo Jahyun Whitmore Andy
Information Management & Computer Security, Vol. 16, Iss. 5, 2008-11 ,pp. :


By Hedström Karin Karlsson Fredrik Kolkowska Ella
Information Management & Computer Security, Vol. 21, Iss. 4, 2013-10 ,pp. :