Author: Jung Eunjin (EJ) Gouda Mohamed G.
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.1, Iss.1-2, 2006-09, pp. : 13-23
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Depender graphs: A method of fault-tolerant certificate distribution
By Wright R.N.
Journal of Computer Security, Vol. 9, Iss. 4, 2001-01 ,pp. :
A Shot at Visual Vulnerability Analysis
COMPUTER GRAPHICS FORUM (ELECTRONIC), Vol. 34, Iss. 3, 2015-06 ,pp. :