Author: Hedabou Mustapha
Publisher: Inderscience Publishers
ISSN: 1744-1765
Source: International Journal of Information and Computer Security, Vol.5, Iss.1, 2012-12, pp. : 68-76
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract