-
1Published 2006Table of Contents: “… and Malicious Code -- Point-Based Trust: Define How Much Privacy Is Worth -- Efficient Protocols for Privacy…”
Full Text via HEAL-Link
Electronic eBook -
2Published 2002Table of Contents: “… Integrated Data Model Based on Code-Points -- K-Order Neighbor: the Efficient Implementation Strategy…”
Full Text via HEAL-Link
Electronic eBook