![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Ciechanowicz C.
Publisher: Elsevier
ISSN: 1363-4127
Source: Information Security Technical Report, Vol.7, Iss.4, 2002-12, pp. : 1-1
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Bouguettaya Athman Benatallah Boualem
Distributed and Parallel Databases, Vol. 18, Iss. 1, 2005-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Genetic Programming and Evolvable Machines, Vol. 7, Iss. 1, 2006-03 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Constraints, Vol. 10, Iss. 4, 2005-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Amsaleg Laurent Jónsson Björn Oria Vincent
Multimedia Tools and Applications, Vol. 31, Iss. 3, 2006-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Cluster Computing, Vol. 8, Iss. 2-3, 2005-07 ,pp. :