Login / Signup
Cryptographic analysis and construction of complete permutations using a recursive approach.
Shuang Xiang
Yingqi Tang
Yan Tong
Jinzhou Huang
Published in:
Int. J. Ad Hoc Ubiquitous Comput. (2024)
Keyphrases
</>
database
artificial intelligence
image processing
mobile robot
neural network
bayesian networks
multi agent systems
information technology
image analysis
smart card