![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Gielerak Roman Sawerwain Marek
Publisher: Springer Publishing Company
ISSN: 1570-0755
Source: Quantum Information Processing, Vol.9, Iss.4, 2010-08, pp. : 441-449
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
On the weakest failure detector for hard agreement problems
By Larrea M.
Journal of Systems Architecture, Vol. 49, Iss. 7, 2003-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Penetration testing and social engineering - Hacking the weakest link
By Barrett N.
Information Security Technical Report, Vol. 8, Iss. 4, 2003-04 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)