Author: Levenhagen R.
Publisher: Elsevier
ISSN: 1353-4858
Source: Network Security, Vol.2004, Iss.1, 2004-01, pp. : 13-15
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Review of Authentication Codes and Combinatorial Designs by Dingyi Pei
By Joyner David
Cryptologia, Vol. 31, Iss. 1, 2007-01 ,pp. :