Article,

Security analysis of a binary image permutation scheme based on Logistic map

, and .
CoRR, (2009)

Meta data

Tags

Users

  • @dblp

Comments and Reviews