Return to Article Details On the computational algorithm related to antikeys Download Download PDF