Author: Vasco María Isabel González
Publisher: Springer Publishing Company
ISSN: 0938-1279
Source: Applicable Algebra in Engineering, Communication and Computing, Vol.14, Iss.5, 2004-01, pp. : 335-340
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
New methods for public key cryptosystems based on XTR
SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol. 8, Iss. 18, 2015-12 ,pp. :
Two-level chaos-based video cryptosystem on H.263 codec
By Chen Zengqiang Ip W. Chan C. Yung K.
Nonlinear Dynamics, Vol. 62, Iss. 3, 2010-11 ,pp. :
A collusion attack on asymmetric group key exchange
SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol. 8, Iss. 13, 2015-09 ,pp. :
Key Word Index of Volume 40 – 2005
Meccanica, Vol. 40, Iss. 4-6, 2005-12 ,pp. :