

Author: Hell Martin Johansson Thomas Meier Willi
Publisher: Inderscience Publishers
ISSN: 1741-1084
Source: International Journal of Wireless and Mobile Computing, Vol.2, Iss.1, 2007-05, pp. : 86-93
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Whittingham-Collingwood Cipher Machine
By Alexander John Coleman Kevin White David Miers Nick Gallehawk John
Cryptologia, Vol. 37, Iss. 4, 2013-10 ,pp. :


Breaking the BTK Killer's Cipher
Cryptologia, Vol. 37, Iss. 3, 2013-07 ,pp. :


Konrad Zuse's Proposal for a Cipher Machine
By Rojas Raul
Cryptologia, Vol. 38, Iss. 4, 2014-10 ,pp. :