Author:
Korba Larry,Song Ronggong,Yee George,Patrick Andrew S.,Buffett Scott,Wang Yunli,Geng Liqiang
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Lecture Notes in Computer Science;L. Korba,2006
2. Luhn’s Algorithm on Wikipedia (last accessed March 20 2007),
http://en.wikipedia.org/wiki/Luhn_algorithm
3. Java programming language, available at:
http://java.sun.com/
(March 2007)
4. Jade Platform (March 2007), available at:
http://sharon.cselt.it/projects/jade/
5. Ashley, P., Powers, C., Schunter, M.: From privacy promises to privacy management: a new approach for enforcing privacy throughout an enterprise. In: Proc. of the, New Security Paradigms Workshop, Virginia Beach, Virgina, pp. 43–50 (2002)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献