Media Coverage of this Article

Found additional news media or blog coverage for the article? Please contact us at submission@sciepub.com.

More by these Authors

Shinsuke Tamura, Hazim A. Haddad, Nazmul Islam, Kazi Md. Rokibul Alam
Information Security and Computer Fraud, Vol. 3, No. 2, 2015, pp 32-38 | Research Article
doi:10.12691/iscf-3-2-2.
Shinsuke Tamura, Hazim A. Haddad
Information Security and Computer Fraud, Vol. 3, No. 1, 2015, pp 15-24 | Research Article
doi:10.12691/iscf-3-1-3.
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud, Vol. 2, No. 3, 2014, pp 39-47 | Research Article
doi:10.12691/iscf-2-3-2.
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud, Vol. 2, No. 1, 2014, pp 10-20 | Research Article
doi:10.12691/iscf-2-1-3.
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud, Vol. 1, No. 1, 2013, pp 1-7 | Research Article
doi:10.12691/iscf-1-1-1.
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud, Vol. 2, No. 3, 2014, pp 39-47 | Research Article
doi:10.12691/iscf-2-3-2.
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud, Vol. 2, No. 1, 2014, pp 10-20 | Research Article
doi:10.12691/iscf-2-1-3.
Shinsuke Tamura, Shuji Taniguchi
Information Security and Computer Fraud, Vol. 1, No. 1, 2013, pp 1-7 | Research Article
doi:10.12691/iscf-1-1-1.