Computation 148, 1, 1--70. Preliminary version appeared (1997)

by Information
Venue:in Proceedings of the 4th ACM Conference on Computer and Communications Security