Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions

Saurabh Dutta, J. K. Mandal. Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions. In Suresh Manandhar, Jim Austin, Uday B. Desai, Yoshio Oyanagi, Asoke K. Talukder, editors, Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings. Volume 3285 of Lecture Notes in Computer Science, pages 324-332, Springer, 2004. [doi]

Abstract

Abstract is missing.