Research Article
Other versions:
- Article InfoArticle Info
- CiteCite
- MetricsMetrics
- CommentComment
- RelatedRelated
- CitedCited
JUCS - Journal of Universal Computer Science 5(1): 20-31
doi:
10.3217/jucs-005-01-0020
Published:
28 Jan 1999
This article is part of:
Authors
Josef Pieprzyk
- Corresponding author
Centre for Computer Security Research School of Information Technology and Computer Science University of Wollongong, Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
Centre for Computer Security Research School of Information Technology and Computer Science University of Wollongong, Wollongong, Australia
Articles by this author in:
CrossRef
|
Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.