![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Hsu Hung-Yuan Zhu Sencun Hurson Ali R.
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.2, Iss.3-4, 2007-04, pp. : 202-215
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Rabara S. Albert Vijayalekshmi S.
International Journal of Internet Protocol Technology, Vol. 6, Iss. 1-2, 2011-06 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)