Protective method for security algorithm of public key infrastructure card.Published in:Journal of Intellectual Property Rights, 2009, v. 14, n. 4, p. 372Publication type:Article