Search for persons
X
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
3
Group-Based Key Exchange Protocol Based on Complete Decompo..:
, In:
?
Women in Industrial and Systems Engineering; Women in Engineering and Science ,
15