Login / Signup
) multipliers dedicated for cryptographic applications.
Danuta Pamula
Edward Hrynkiewicz
Published in:
DDECS (2013)
Keyphrases
</>
smart card
real time
search algorithm
cellular automata
s box
security properties
databases
data mining
learning algorithm
social networks
case study
bayesian networks
digital libraries
privacy preserving
key management
security protocols