logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 18(12): 1608-1627
https://doi.org/10.3217/jucs-018-12-1608 (28 Jun 2012)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 18(12): 1608-1627
doi: 10.3217/jucs-018-12-1608
Received: 15 Sep 2011 | Approved: 15 Feb 2012 | Published: 28 Jun 2012
This article is part of:
JUCS - Journal of Universal Computer Science 18(12): An Overview of Current Information Systems Security Challenges and Innovations
Authors
Haralambos Mouratidis - Corresponding author
University of East London, London, United Kingdom
Articles by this author in:  CrossRef  |  Google Scholar
Christos Kalloniatis
University of the Aegean, Mytilene, Greece
Articles by this author in:  CrossRef  |  Google Scholar
Shareeful Islam
University of East London, London, United Kingdom
Articles by this author in:  CrossRef  |  Google Scholar
Marc-Philippe Huget
University of Savoie, Annecy-Chambéry, France
Articles by this author in:  CrossRef  |  Google Scholar
Stefanos Gritzalis
University of the Aegean, Mytilene, Greece
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK