

Author: Fraysseix Hubert Mendez Patrice Ossona
Publisher: Springer Publishing Company
ISSN: 0178-4617
Source: Algorithmica, Vol.47, Iss.4, 2007-05, pp. : 453-463
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content




The intersection of retracts of A *
Theoretical Computer Science, Vol. 237, Iss. 1, 2000-04 ,pp. :




Exclusion-intersection encryption
By Chow Sherman S.M. Yiu Siu-Ming
International Journal of Security and Networks, Vol. 6, Iss. 2-3, 2011-11 ,pp. :


By Park Sang C.
The Visual Computer, Vol. 20, Iss. 7, 2004-09 ,pp. :