

Author: Atluri Vijayalakshmi Ray Indrakshi
Publisher: Springer Publishing Company
ISSN: 1432-5012
Source: International Journal on Digital Libraries, Vol.4, Iss.3, 2004-11, pp. : 137-138
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content


By Knight Scott
International Journal of Information Security (IJIS), Vol. 6, Iss. 5, 2007-09 ,pp. :


Special Issue on Cyber-Security for Development
By Osei-Bryson Kweku-Muata Vogel Doug
Information Technology for Development, Vol. 20, Iss. 2, 2014-04 ,pp. :


By Batchu Rajanikanth Dandass Yoginder S. Skjellum Anthony Beddhu Murali
Cluster Computing, Vol. 7, Iss. 4, 2004-10 ,pp. :

