Author:
Ravula Arun Kumar,Ahmad Sayed Sayeed,Singh Amit Kumar,Sweeti ,Kaur Amritpal,Kumar Sarvesh
Reference28 articles.
1. Cryptanalysis of dynamic look-up table based chaotic cryptosystems
2. Guest Editors' Introduction: Shouldn't All Security Be Usable?
3. G. Millerioux, J.M. Amigo, and J. Daafouz. A connection between chaotic and conventional cryptography. Circuits and Systems I: Regular Papers, IEEE Transactions on, 55(6):1695–1703, 2008.
4. Comment on “Modified Baptista type chaotic cryptosystem via matrix secret key” [Phys. Lett. A 372 (2008) 5427]
5. Sweeti, Nivedita M (2016), Similarity Based Technique and Text document classification, International Journal of Advance Engineering Research and Technology(IJAERT), volume 4, Issue 2, 23–30.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献