n) Equations

Xinqian Lin, Shengqiang Tang, Wentao Huang. n) Equations. J. Information Security, 3(3):185-188, 2012. [doi]

@article{LinTH12-0,
  title = {n) Equations},
  author = {Xinqian Lin and Shengqiang Tang and Wentao Huang},
  year = {2012},
  doi = {10.4236/jis.2012.33022},
  url = {http://dx.doi.org/10.4236/jis.2012.33022},
  researchr = {https://researchr.org/publication/LinTH12-0},
  cites = {0},
  citedby = {0},
  journal = {J. Information Security},
  volume = {3},
  number = {3},
  pages = {185-188},
}