IET Information Security
IET Information Security > 2016 > 10 > 1 > 37 - 44
IET Information Security > 2016 > 10 > 1 > 45 - 52
IET Information Security > 2016 > 10 > 1 > 1 - 7
IET Information Security > 2016 > 10 > 1 > 18 - 27
IET Information Security > 2016 > 10 > 1 > 8 - 17
IET Information Security > 2016 > 10 > 1 > 28 - 32
IET Information Security > 2016 > 10 > 1 > 33 - 36
IET Information Security > 2016 > 10 > 2 > 80 - 86
IET Information Security > 2016 > 10 > 2 > 95 - 103
IET Information Security > 2016 > 10 > 2 > 53 - 59
IET Information Security > 2016 > 10 > 2 > 104 - 111
IET Information Security > 2016 > 10 > 2 > 87 - 94
IET Information Security > 2016 > 10 > 2 > 60 - 68
IET Information Security > 2016 > 10 > 2 > 69 - 79
IET Information Security > 2016 > 10 > 3 > 142 - 151
IET Information Security > 2016 > 10 > 3 > 113 - 118
IET Information Security > 2016 > 10 > 3 > 125 - 133
IET Information Security > 2016 > 10 > 3 > 119 - 124
IET Information Security > 2016 > 10 > 3 > 152 - 155
IET Information Security > 2016 > 10 > 3 > 134 - 141