Springer, Journal of Cryptographic Engineering, 2(5), p. 71-72, 2015
DOI: 10.1007/s13389-015-0098-x
Export citation
Search in Google Scholar
Full text: Download