You have free access to this content

Security and Communication NetworksVolume 7, Issue 1, Article first published online: 9 MAY 2012