Mitchell, Chris J and Piper, Fred C (1988) Key storage in secure networks. Discrete Applied Mathematics, 21 (3).
Full text access: Open
This is a Submitted version This version's date is: 1988 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/b7c05cc6-86d1-ac09-120a-778b7b070f2c/1/
Deposited by Research Information System (atira) on 03-Nov-2012 in Royal Holloway Research Online.Last modified on 03-Nov-2012