Springer Verlag, Journal of Cryptographic Engineering, 3(2), p. 161-177
DOI: 10.1007/s13389-012-0036-0
Export citation
Search in Google Scholar
Full text: Unavailable