

Author: Srivastava Aashish
Publisher: Springer Publishing Company
ISSN: 1389-5753
Source: Electronic Commerce Research, Vol.11, Iss.4, 2011-11, pp. : 357-382
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Why don’t they practice what we preach?
Annals of Software Engineering, Vol. 6, Iss. 1-4, 1998-01 ,pp. :




Why Don't We Decipher an Outdated Cipher System? The Codex of Rohonc
By Lang Benedek
Cryptologia, Vol. 34, Iss. 2, 2010-04 ,pp. :