COMPUTATIONAL SCIENCE GUIDED SOFT COMPUTING BASED CRYPTOGRAPHIC TECHNIQUE USING ANT COLONY INTELLIGENCE FOR WIRELESS COMMUNICATION (ACICT)
暂无分享,去创建一个
[1] Andreas Ruttor,et al. Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[2] Wolfgang Kinzel,et al. Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..
[3] Jungkyu Han,et al. An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices , 2007, SAC '07.
[4] Charles P. Pfleeger,et al. Security in computing , 1988 .
[5] William Stallings,et al. Cryptography and network security , 1998 .
[6] I Kanter,et al. Secure key-exchange protocol with an absence of injective functions. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[8] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[9] Eli Biham,et al. Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays , 2005, IACR Cryptol. ePrint Arch..