Information Security and Cryptography, p. 221-236
DOI: 10.1007/978-3-642-29656-7_13
Export citation
Search in Google Scholar
Full text: Unavailable