Author: Soutar C.
Publisher: Elsevier
ISSN: 1363-4127
Source: Information Security Technical Report, Vol.7, Iss.4, 2002-12, pp. : 49-55
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
By Rudall B.H.
Kybernetes: The International Journal of Systems & Cybernetics, Vol. 33, Iss. 8, 2004-08 ,pp. :