Cryptology and Network Security, p. 146-158
DOI: 10.1007/978-3-540-76969-9_10
Export citation
Search in Google Scholar
Full text: Unavailable