Kwon, T.2022-03-022022-03-0220133-642-37681-9978-3-642-37681-8978-3-642-37682-5https://publica.fraunhofer.de/handle/publica/155439Information security and cryptology, ICISC 2012. 15th international conference