Journal of Information Security and Applications
Journal of Information Security and Applications > 2014 > 19 > 6 > 331-340
Journal of Information Security and Applications > 2015 > 20 > Complete > 37-46
Journal of Information Security and Applications > 2015 > 20 > Complete > 84-89
Journal of Information Security and Applications > 2015 > 20 > Complete > 61-73
Journal of Information Security and Applications > 2015 > 20 > Complete > 74-83
Journal of Information Security and Applications > 2015 > 20 > Complete > 3-10
Journal of Information Security and Applications > 2015 > 20 > Complete > 90-98
Journal of Information Security and Applications > 2015 > 20 > Complete > 26-36
Journal of Information Security and Applications > 2015 > 20 > Complete > 47-60
Journal of Information Security and Applications > 2015 > 20 > Complete > 11-25
Journal of Information Security and Applications > 2015 > 22 > Complete > 54-65
Journal of Information Security and Applications > 2015 > 22 > Complete > 28-39
Journal of Information Security and Applications > 2015 > 22 > Complete > 40-53
Journal of Information Security and Applications > 2015 > 22 > Complete > 17-27
Journal of Information Security and Applications > 2015 > 22 > Complete > 87-98
Journal of Information Security and Applications > 2015 > 22 > Complete > 113-122
Journal of Information Security and Applications > 2015 > 22 > Complete > 66-80
Journal of Information Security and Applications > 2015 > 22 > Complete > 99-112
Journal of Information Security and Applications > 2015 > 22 > Complete > 3-16