![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: HUANG WAYNE W.
Publisher: Taylor & Francis Ltd
ISSN: 1362-3001
Source: Behaviour and Information Technology, Vol.22, Iss.1, 2003-01, pp. : 17-29
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Secrecy types for asymmetric communication
Theoretical Computer Science, Vol. 298, Iss. 3, 2003-04 ,pp. :