![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Bos Joppe W.
Publisher: Inderscience Publishers
ISSN: 1753-0563
Source: International Journal of Applied Cryptography, Vol.2, Iss.3, 2012-02, pp. : 212-228
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Hitchcock Yvonne Montague Paul Carter Gary Dawson Ed
International Journal of Information Security (IJIS), Vol. 3, Iss. 2, 2004-11 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)