Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,General Computer Science
Reference17 articles.
1. Dr. Ch. Rupa, P.S. Avadhani, Information security using chains matrix multiplication, Advances in intelligent and soft computing, 167 (Springer, CSIA, 2012), 703–712
2. P.M. Rubesh Anand, I.G. Bajpa, V. Bhaskar, Real-time symmetric crypto graphy using quaternion julia set, Int J Comp Sci Network Security, 9(3), 20–26 (2009)
3. Yongge Wang, Yvo Desmedt, Perfectly secure message transmission revisited, IEEE transactions on informaiton theory, (2008), 54(6), 2582–2596
4. D.V. Popel, Sierpinski gaskets for logic functions representation multiple-valued logic (ISMVL, 2002)
5. R.L. Devaney, Measure topology and fractal geometry (1990), 65–75
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献