Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions

Saurabh Dutta, J. K. Mandal. Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions. In Suresh Manandhar, Jim Austin, Uday B. Desai, Yoshio Oyanagi, Asoke K. Talukder, editors, Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings. Volume 3285 of Lecture Notes in Computer Science, pages 324-332, Springer, 2004. [doi]

Authors

Saurabh Dutta

This author has not been identified. Look up 'Saurabh Dutta' in Google

J. K. Mandal

This author has not been identified. Look up 'J. K. Mandal' in Google