Login / Signup

Cryptographic analysis and construction of complete permutations using a recursive approach.

Shuang XiangYingqi TangYan TongJinzhou Huang
Published in: Int. J. Ad Hoc Ubiquitous Comput. (2024)
Keyphrases
  • database
  • artificial intelligence
  • image processing
  • mobile robot
  • neural network
  • bayesian networks
  • multi agent systems
  • information technology
  • image analysis
  • smart card