1
2
3
4
5
6
Computers & security, 24 (2005) S. 485 - 491
7
8
9
10
11