Securing information in X.25 networks | IEEE Conference Publication | IEEE Xplore