Journal of the Korea Institute of Information Security and Cryptology, 2(25), p. 261-270
DOI: 10.13089/jkiisc.2015.25.2.261
Export citation
Search in Google Scholar
Full text: Download