Information Security and Cryptography, p. 237-257
DOI: 10.1007/978-3-642-14452-3_11
Export citation
Search in Google Scholar
Full text: Unavailable