

Author: Hsu Hung-Yuan Zhu Sencun Hurson Ali R.
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.2, Iss.3-4, 2007-04, pp. : 202-215
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Rabara S. Albert Vijayalekshmi S.
International Journal of Internet Protocol Technology, Vol. 6, Iss. 1-2, 2011-06 ,pp. :



