A Novel Method of Hiding Message Using Musical Notes
暂无分享,去创建一个
[2] Alper Kanak. BIOMETRICS FOR COMPUTER SECURITY AND CRYPTOGRAPHY , 2004 .
[3] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[4] Avijit Kar,et al. Network Security Using Biometric and Cryptography , 2008, ACIVS.
[5] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[6] Runze Li,et al. Design and Modeling for Computer Experiments , 2005 .
[7] M.T. Sakalli,et al. Cryptography education for students , 2004, Information Technology Based Proceedings of the FIfth International Conference onHigher Education and Training, 2004. ITHET 2004..
[8] Soubhik Chakraborty,et al. On why an algorithmic time complexity measure can be system invariant rather than system independent , 2007, Appl. Math. Comput..