Information Security Applications, p. 173-186
DOI: 10.1007/978-3-540-71093-6_14
Export citation
Search in Google Scholar
Full text: Unavailable