1
Published 2007
Table of Contents: ... -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... Problem -- Unsupervised Anomaly Detection Based n an Evolutionary Artificial Immune Network...
View full text
Electronic eBook