Sign in

Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions.

Saurabh DuttaJ. K. Mandal
Published in: AACC (2004)
Keyphrases