Login / Signup
Cryptography based on transcendental numbers.
Josef Pieprzyk
Hossein Ghodosi
Chris Charnes
Reihaneh Safavi-Naini
Published in:
ACISP (1996)
Keyphrases
</>
cellular automata
database
image analysis
genetic algorithm
artificial intelligence
information systems
multimedia
data analysis
artificial neural networks
wireless sensor networks
software engineering