Login / Signup
Weakness on Cryptographic Schemes Based on Chained Codes.
Omessaad Hamdi
Ammar Bouallegue
Sami Harari
Published in:
NSS (2009)
Keyphrases
</>
reed solomon
error correction
databases
error correcting
protection schemes
data sets
learning algorithm
information systems
decision trees
wireless sensor networks
smart card
security protocols
space time block codes