The construction and implementation of authentication and secrecy codes
Main Author: | |
---|---|
Published: |
2013
|
Online Access: | http://hdl.handle.net/1993/17244 |
Main Author: | |
---|---|
Published: |
2013
|
Online Access: | http://hdl.handle.net/1993/17244 |