Compliant cryptologic protocols.
Autor: | Dawson, Ed, Viswanathan, Kapali, Boyd, Colin |
---|---|
Zdroj: | International Journal of Information Security. 2002, Vol. 1 Issue 3, p189. 14p. |
Databáze: | Academic Search Ultimate |
Externí odkaz: |
Autor: | Dawson, Ed, Viswanathan, Kapali, Boyd, Colin |
---|---|
Zdroj: | International Journal of Information Security. 2002, Vol. 1 Issue 3, p189. 14p. |
Databáze: | Academic Search Ultimate |
Externí odkaz: |