logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 3(6): 730-753
https://doi.org/10.3217/jucs-003-06-0730 (28 Jun 1997)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 3(6): 730-753
doi: 10.3217/jucs-003-06-0730
Published: 28 Jun 1997
This article is part of:
JUCS - Journal of Universal Computer Science 3(6)
Authors
Ahmad Baraani-Dastjerdi - Corresponding author
University of Wollongong, Wollongong, Australia
Articles by this author in:  CrossRef  |  Google Scholar
Josef Pieprzyk
University of Wollongong, Wollongong, Australia
Articles by this author in:  CrossRef  |  Google Scholar
Reihaneh Safavi-Naini
Centre for Computer Security Research, University of Wollongong, Wollongong, Australia
Articles by this author in:  CrossRef  |  Google Scholar
Janusz R. Getta
University of Wollongong, Wollongong, Australia
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK