ICDS
13 years 11 months ago
2010 IEEE
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
ICDS
13 years 11 months ago
2010 IEEE WG
13 years 3 months ago
2010 Springer
book Author Title 58 Bijo S Anand Atoms and clique separators in graph products 59 Asir T Domination in total graph of a commutative ring 60 Sharada B On the Neighbourhood Subdivi...
SOFSEM
14 years 1 months ago
2010 Springer STACS
13 years 12 months ago
2010 Springer
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
|