Springer Verlag, Journal of Cryptographic Engineering, 4(1), p. 293-302
DOI: 10.1007/s13389-011-0023-x
Export citation
Search in Google Scholar
Full text: Download