A case study of impersonation from a security systems point of view Authors Elisabeth Zetterholm Daniel Elenius Mats Blomberg Downloads View PDF Published 2009-11-18 Issue Vol. 51 (2005) Section Articles