Saurabh Dutta, J. K. Mandal. Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions. In Suresh Manandhar, Jim Austin, Uday B. Desai, Yoshio Oyanagi, Asoke K. Talukder, editors, Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings. Volume 3285 of Lecture Notes in Computer Science, pages 324-332, Springer, 2004. [doi]
@inproceedings{DuttaM04, title = {Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions}, author = {Saurabh Dutta and J. K. Mandal}, year = {2004}, url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3285&spage=324}, tags = {security, e-science}, researchr = {https://researchr.org/publication/DuttaM04}, cites = {0}, citedby = {0}, pages = {324-332}, booktitle = {Applied Computing, Second Asian Applied Computing Conference, AACC 2004, Kathmandu, Nepal, October 29-31, 2004. Proceedings}, editor = {Suresh Manandhar and Jim Austin and Uday B. Desai and Yoshio Oyanagi and Asoke K. Talukder}, volume = {3285}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-23659-7}, }