|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 2 scholarly publications.
Computer security
Image encryption
Network security
Solid state lighting
Data storage
Data communications
Internet