Login / Signup
Cell Phone Crypto Cracked.
Bill Hancock
Published in:
Comput. Secur. (2000)
Keyphrases
</>
security protocols
image segmentation
relational databases
resource constrained
digital signature
hand held devices
neural network
information retrieval
multimedia