logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 22(4): 567-588
https://doi.org/10.3217/jucs-022-04-0567 (01 Apr 2016)
Other versions:
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 22(4): 567-588
doi: 10.3217/jucs-022-04-0567
Received: 30 Oct 2015 | Approved: 30 Mar 2016 | Published: 01 Apr 2016
This article is part of:
JUCS - Journal of Universal Computer Science 22(4): Advanced Research on Software Security Design and Applications
Authors
Ahmad Karim - Corresponding author
University of Malaya, Kuala Lumpur, Malaysia
Articles by this author in:  CrossRef  |  Google Scholar
Muhammad Khurram Khan
King Saud University, Riyadh, Saudi Arabia
Articles by this author in:  CrossRef  |  Google Scholar
Aisha Siddiqa
University of Malaya, Kuala Lumpur, Malaysia
Articles by this author in:  CrossRef  |  Google Scholar
Kim-Kwang Raymond Choo
University of South Australia, Adelaide, Australia
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK