[Lecture Notes in Computer Science] Applied Computing...

  • Main
  • [Lecture Notes in Computer Science]...

[Lecture Notes in Computer Science] Applied Computing Volume 3285 || Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions

Manandhar, Suresh, Austin, Jim, Desai, Uday, Oyanagi, Yoshio, Talukder, Asoke K.
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Volume:
10.1007/b1
Year:
2004
Language:
english
DOI:
10.1007/978-3-540-30176-9_42
File:
PDF, 327 KB
english, 2004
Conversion to is in progress
Conversion to is failed