Return to Article Details Construction of hybrid security systems based on the crypto-code structures and flawed codes Download Download PDF