|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
Information security
Process modeling
Cryptography
Symmetric-key encryption