Login / Signup

The Application of the Pseudo Vector Multiplication in the Image Encryption Algorithm.

Xiang LiuZongying Li
Published in: ICAIC (1) (2011)
Keyphrases
  • wireless sensor networks