

Author: Ors Berna Batina Lejla Preneel Bart Vandewalle Joos
Publisher: Inderscience Publishers
ISSN: 1741-1068
Source: International Journal of Embedded Systems, Vol.3, Iss.4, 2009-01, pp. : 229-240
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






International Journal of Information and Computer Security, Vol. 5, Iss. 3, 2013-08 ,pp. :

