![](/img/cover-not-exists.png)
[Lecture Notes in Computer Science] Applied Computing Volume 3285 || Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions
Manandhar, Suresh, Austin, Jim, Desai, Uday, Oyanagi, Yoshio, Talukder, Asoke K.Volume:
10.1007/b1
Year:
2004
Language:
english
DOI:
10.1007/978-3-540-30176-9_42
File:
PDF, 327 KB
english, 2004