Information Security.Published in:International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 5, p. 4Publication type:Article