Author: Burgess Mark Canright Geoffrey Engø-Monsen Kenth
Publisher: Springer Publishing Company
ISSN: 1615-5262
Source: International Journal of Information Security (IJIS), Vol.3, Iss.2, 2004-11, pp. : 70-85
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.