1
Published: 2012.
Links: Get full text
2
Published: c2010.
Superior document: Cryptology and information security series, v. 4
Links: Get full text
3
Published: [2014]
Superior document: Cryptology and information security series, volume 12
Links: Get full text