Journal of the Korea Institute of Information Security and Cryptology, 3(25), p. 509-517
DOI: 10.13089/jkiisc.2015.25.3.509
Export citation
Search in Google Scholar
Full text: Download