V-to-X Security Combination of multiple Mechanisms
Crossref DOI link: https://doi.org/10.1007/s38314-017-0029-y
Published Online: 2017-04-19
Published Print: 2017-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Haran, Onn
Text and Data Mining valid from 2017-04-01