[1]
Cox, L.H. 2010. Vulnerability of Complementary Cell Suppression to Intruder Attack. Journal of Privacy and Confidentiality. 1, 2 (Apr. 2010). DOI:https://doi.org/10.29012/jpc.v1i2.576.