ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An example application of the trusted network interpretation
[1990] Proceedings of the Sixth Annual Computer Security Applications Conference
◽
10.1109/csac.1990.143745
◽
2002
◽
Author(s):
P.W. Mallett
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close