|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 3 scholarly publications.
Network security
Computer simulations
Information security
Cryptography
Device simulation
Computer security
Data transmission