Author: Fitzgerald Kevin J
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.3, Iss.4, 1995-04, pp. : 27-33
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Data integration under integrity constraints
By Cali A. Calvanese D. De Giacomo G. Lenzerini M.
Information Systems, Vol. 29, Iss. 2, 2004-04 ,pp. :
Information Management & Computer Security, Vol. 4, Iss. 2, 1996-02 ,pp. :
Security of data hiding technologies
By Voloshynovskiy S. Pun T. Fridrich J. Perez-Gonzalez F. Memon N.
Signal Processing, Vol. 83, Iss. 10, 2003-10 ,pp. :