Introduction

Author: Piper F.   Price G.   Paterson K.  

Publisher: Elsevier

ISSN: 1363-4127

Source: Information Security Technical Report, Vol.8, Iss.3, 2003-07, pp. : 5-5

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract