Cryptography , Network Security and Applications in the Armed Forces

@inproceedings{Daras2014CryptographyN,
  title={Cryptography , Network Security and Applications in the Armed Forces},
  author={Nicholas J. Daras},
  year={2014}
}
  • Nicholas J. Daras
  • Published 2014
Editor: Nicholas J. Daras 2nd International Conference on Cryptography, Network Security and Applications in the Armed Forces Hellenic Military Academy 
Highly Cited
This paper has 22 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
16 Citations
62 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 16 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 62 references

Waiting time for an almost perfect run and applications in statistical process control, Methodology and Computing

  • S. Bersimis, M. V. Koutras, G. K. Papadopoulos
  • in Applied Probability,
  • 2014

Applications of Chaos and Nonlinear Dynamics in Engineering

  • S. Banerjee
  • 2011

Good second-order nonlinearity of a bent function via Niho power function, IACR Cryptology ePrint Archive, report

  • M. Garg, S. Gangopadhyay
  • [available
  • 2011

Similar Papers

Loading similar papers…