Journal of the Korea Institute of Information Security and Cryptology, 5(24), p. 1013-1022
DOI: 10.13089/jkiisc.2014.24.5.1013
Export citation
Search in Google Scholar
Full text: Download