Search results
IEEE Transactions on Information Forensics and Security > 2018 > 13 > 1 > 186 - 196
Journal of Behavior Therapy and Experimental Psychiatry > 2017 > 56 > C > 71-78
Arabian Journal for Science and Engineering > 2018 > 43 > 2 > 661-673
Wireless Personal Communications > 2017 > 96 > 4 > 5881-5896
Journal of Behavior Therapy and Experimental Psychiatry > 2017 > 54 > C > 211-218
IEEE Transactions on Computers > 2016 > 65 > 6 > 1992 - 2004
Lecture Notes in Computer Science > Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices > Smart Card Security > 229-236
IEEE Transactions on Information Forensics and Security > 2016 > 11 > 3 > 484 - 497
Computer Law & Security Review > 2016 > 32 > 1 > 91-110
Multimedia Tools and Applications > 2017 > 76 > 2 > 1801-1815
Scientia Iranica > 2012 > 19 > 6 > 1856-1860
Journal of Electronics (China) > 2012 > 29 > 6 > 550-555
Computers & Security > 2011 > 30 > 4 > 208-220
Discussiones Mathematicae Graph Theory > 2003 > 23 > 2 > 287-307