

Author: Roper William
Publisher: Inderscience Publishers
ISSN: 1470-6075
Source: International Journal of Technology Transfer and Commercialisation, Vol.4, Iss.3, 2005-02, pp. : 401-420
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Rationale Visualization for Safety and Security
COMPUTER GRAPHICS FORUM (ELECTRONIC), Vol. 34, Iss. 3, 2015-06 ,pp. :


Trusted Computing: Security and Applications
By Gallery Eimear Mitchell Chris
Cryptologia, Vol. 33, Iss. 3, 2009-07 ,pp. :

