Open Access. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of La Trobe University's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to email@example.com
By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
This paper was reprinted from International Symposium on Communications and Information Technologies ISCIT 2007, pp. 768-773, and may be found http://dx.doi.org/10.1109/ISCIT.2007.4392120 access via this link is only available with a subscription. A full text version is available above.
Copyright (2007) IEEE
International Conference on Networks Security, Wireless Communications and Trusted Computing. Proceedings, 1-3(1): 768-773