Springer Verlag, Cryptography and Communications, 2(10), p. 291-299
DOI: 10.1007/s12095-017-0221-1
Export citation
Search in Google Scholar
Full text: Unavailable