Author: Emery D. Upton S. Trevorah R.
Publisher: Elsevier
ISSN: 1363-4127
Source: Information Security Technical Report, Vol.8, Iss.3, 2003-07, pp. : 23-35
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract