1
Cyhoeddwyd 2013
Tabl Cynhwysion: ... Approach: Hiding Data in a List of Words -- Secure Cryptosystem with Blind Authentication -- An Effective...
Cael y testun llawn
Electronig eLyfr