Journal
IEEE SECURITY & PRIVACY
Volume 2, Issue 3, Pages 49-55Publisher
IEEE COMPUTER SOC
DOI: 10.1109/MSP.2004.26
Keywords
-