Journal of Information Security and Applications
Journal of Information Security and Applications > 2013 > 18 > 2-3 > 130-137
Journal of Information Security and Applications > 2013 > 18 > 2-3 > 98-107
Journal of Information Security and Applications > 2013 > 18 > 2-3 > 148-156
Journal of Information Security and Applications > 2013 > 18 > 2-3 > 108-129
Journal of Information Security and Applications > 2013 > 18 > 2-3 > 138-147
Journal of Information Security and Applications > 2013 > 18 > 4 > 215-218
Journal of Information Security and Applications > 2013 > 18 > 4 > 180-192
Journal of Information Security and Applications > 2013 > 18 > 4 > 206-214
Journal of Information Security and Applications > 2013 > 18 > 4 > 193-205
Journal of Information Security and Applications > 2013 > 18 > 4 > 167-179
Journal of Information Security and Applications > 2013 > 18 > 4 > 157-166
Journal of Information Security and Applications > 2014 > 19 > 1 > 78-87
Journal of Information Security and Applications > 2014 > 19 > 1 > 18-24
Journal of Information Security and Applications > 2014 > 19 > 1 > 61-77
Journal of Information Security and Applications > 2014 > 19 > 1 > 2-17
Journal of Information Security and Applications > 2014 > 19 > 1 > 45-60
Journal of Information Security and Applications > 2014 > 19 > 1 > 25-44