Author(s): H Holm, M. Karresand, A. Vidstrm, E. Westring, S. Buchegger, M Dam, M DAM
Publication date: 2015
Journal: Nordic Conference on Secure IT Systems