Journal of the Korea Institute of Information Security and Cryptology, 6(25), p. 1319-1326
DOI: 10.13089/jkiisc.2015.25.6.1319
Export citation
Search in Google Scholar
Full text: Download