Journal of the Korea Institute of Information Security and Cryptology, 2(25), p. 457-465
DOI: 10.13089/jkiisc.2015.25.2.457
Export citation
Search in Google Scholar
Full text: Download