Author: Ciechanowicz C.
Publisher: Elsevier
ISSN: 1363-4127
Source: Information Security Technical Report, Vol.8, Iss.4, 2003-04, pp. : 5-5
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
By Bouguettaya Athman Benatallah Boualem
Distributed and Parallel Databases, Vol. 18, Iss. 1, 2005-07 ,pp. :
Genetic Programming and Evolvable Machines, Vol. 7, Iss. 1, 2006-03 ,pp. :
Constraints, Vol. 10, Iss. 4, 2005-10 ,pp. :
By Amsaleg Laurent Jónsson Björn Oria Vincent
Multimedia Tools and Applications, Vol. 31, Iss. 3, 2006-12 ,pp. :
Cluster Computing, Vol. 8, Iss. 2-3, 2005-07 ,pp. :