Scoping identity theft

Rebecca T. Mercuri
2006 Communications of the ACM  
doi:10.1145/1125944.1125961 fatcat:pyyjuf7imjbodeyiqf7oauo36m