Research Article
Other versions:
- Article InfoArticle Info
- CiteCite
- MetricsMetrics
- CommentComment
- RelatedRelated
- CitedCited
JUCS - Journal of Universal Computer Science 3(3): 185-196
doi:
10.3217/jucs-003-03-0185
Published:
28 Mar 1997
This article is part of:
Authors
S. Bakhtiari
- Corresponding author
Centre for Computer Security Research, University of Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
Centre for Computer Security Research, University of Wollongong, Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
Centre for Computer Security Research, University of Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.