• Title of article

    This article provides one large corporateʹs view on the use of cryptographic methods to protect the corporate network.

  • Author/Authors

    John Walker، نويسنده , , Information Security Policy Group، نويسنده ,

  • Issue Information
    روزنامه با شماره پیاپی سال 1997
  • Pages
    7
  • From page
    21
  • To page
    27
  • Journal title
    Information Security Technical Report
  • Serial Year
    1997
  • Journal title
    Information Security Technical Report
  • Record number

    177491