![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Pandey Pankaj Snekkenes Einar
Publisher: MDPI
E-ISSN: 1999-5903|8|2|20-20
ISSN: 1999-5903
Source: Future Internet, Vol.8, Iss.2, 2016-05, pp. : 20-20
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
The Transfer of Information and Mobile Computing
Knowledge Management: An International Journal, Vol. 12, Iss. 4, 2013-01 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Using Proven Reference Monitor Patterns for Security Evaluation
By Heckman Mark R. Schell Roger R.
Information, Vol. 7, Iss. 2, 2016-04 ,pp. :