Khabbazian, Majid.2008-04-102008-04-1020042008-04-10http://hdl.handle.net/1828/515Computers -- Access controlCryptographySoftware elliptic curve cryptography