Author of the publication

Enhancing security in cryptographic algorithm based on LECCRS.

, and . Electron. Gov. an Int. J., 13 (1): 31-48 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatially Non-Uniform Time-Step Adaptation in Unsteady Flow Problems, and . 21st Century Challenges in Computational Engineering and Science. International symposium on the occasion of the 75th birthday of Antony Jameson, (November 2009)Region-based adaptive slicing., , and . Comput. Aided Des., 31 (5): 317-333 (1999)Enhancing security in cryptographic algorithm based on LECCRS., and . Electron. Gov. an Int. J., 13 (1): 31-48 (2017)Rollback and Recovery Strategies for Computer Programs., and . IEEE Trans. Computers, 21 (6): 546-556 (1972)Deterministic Parallel FORTRAN., and . PPSC, page 798-805. SIAM, (1993)Product Form and Local Balance in Queueing Networks., , and . J. ACM, 24 (2): 250-263 (1977)A Cottage Industry of Software Publishing: Implications for Theories of Composition., , and . IPPS/SPDP Workshops, volume 1388 of Lecture Notes in Computer Science, page 890-899. Springer, (1998)On the Design of Elementary Distributed Systems., and . Berkeley Workshop, page 289-321. Technical Information Department, Lawrence Berkeley Laboratory, University of California, Berkeley CA, (1978)Sense and Respond Systems.. Int. CMG Conference, page 59-66. Computer Measurement Group, (2005)Performance Management of Parallel Computers.. Int. CMG Conference, page 1076-1078. Computer Measurement Group, (1988)