Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions

Saurabh Dutta, J. K. Mandal. Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions. In Suresh Manandhar, Jim Austin, Uday B. Desai, Yoshio Oyanagi, Asoke K. Talukder, editors, Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings. Volume 3285 of Lecture Notes in Computer Science, pages 324-332, Springer, 2004. [doi]

@inproceedings{DuttaM04,
  title = {Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions},
  author = {Saurabh Dutta and J. K. Mandal},
  year = {2004},
  url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3285&spage=324},
  tags = {security, e-science},
  researchr = {https://researchr.org/publication/DuttaM04},
  cites = {0},
  citedby = {0},
  pages = {324-332},
  booktitle = {Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings},
  editor = {Suresh Manandhar and Jim Austin and Uday B. Desai and Yoshio Oyanagi and Asoke K. Talukder},
  volume = {3285},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-23659-7},
}