Research Article
Other versions:
- Article InfoArticle Info
- CitationCitation
- MetricsMetrics
- CommentComment
- RelatedRelated
- CitedCited
JUCS - Journal of Universal Computer Science 3(6): 730-753
doi:
10.3217/jucs-003-06-0730
Published:
28 Jun 1997
This article is part of:
Authors
Ahmad Baraani-Dastjerdi
- Corresponding author
University of Wollongong, Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
University of Wollongong, Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
Centre for Computer Security Research, University of Wollongong, Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
University of Wollongong, Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.