Citation: A. Dowling et Jg. Keating, A proxy-based security architecture for Internet applications in an extranet environment, J SYST SOFT, 58(2), 2001, pp. 107-118
Citation: Z. Javadpour et Jg. Keating, Connectionist model of the generalized Hough transform for optical implementation, OPT ENG, 39(6), 2000, pp. 1717-1722