Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference22 articles.
1. Longley, P. A., et al. (2005). Geographic information systems and science. New York: Wiley.
2. Washington, L. C. (2003). Elliptic curves: Number theory and cryptography. New York: Chapman and Hall/CRC.
3. Chandy, K. M., & Lamport, L. (1985). Distributed snapshots: Determining global states of distributed systems. ACM Transactions on Computer Systems (TOCS), 3(1), 63–75.
4. Stallings, W. (2006). Cryptography and network security, 4/E. Bengaluru: Pearson Education India.
5. Diffie, Whitfield, & Hellman, Martin. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Preserving sensitive data with deep learning assisted sanitisation process;Journal of Experimental & Theoretical Artificial Intelligence;2022-12-04