Title of article :
This article provides one large corporateʹs view on the use of cryptographic methods to protect the corporate network.
Author/Authors :
John Walker، نويسنده , , Information Security Policy Group، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 1997
Journal title :
Information Security Technical Report
Journal title :
Information Security Technical Report