![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Reeser P. Hariharan R.
Publisher: Springer Publishing Company
ISSN: 1018-4864
Source: Telecommunication Systems, Vol.21, Iss.2-4, 2002-12, pp. : 283-299
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Distributed Computing Attacks on Cryptographic Systems
BT Technology Journal, Vol. 17, Iss. 2, 1999-04 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)