Cited By
View all- Schneier B(2015)ReferencesApplied Cryptography, Second Edition10.1002/9781119183471.refs(675-741)Online publication date: 9-Oct-2015
- Hauser R(1997)Control of Information Distribution and Access10.1016/S0065-2458(08)60340-X(219-283)Online publication date: 1997