Author: McNamarra, R.
Source: Information Security Technical Report, Volume 2, Number 3, 1997, pp. 66-79(14)
This article is hosted on another website.
You may be required to register, activate a subscription or purchase the article before you can obtain the full text.
Document Type: Research Article
Publication date: January 1, 1997