Generation of solved instances of Multiconstraint Knapsack problem and its applications to Private Key Cipher

被引:0
|
作者
Lin, Y. C.
Chow, L. R.
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 11 条
  • [1] The probe metaheuristic and its application to the multiconstraint knapsack problem
    Barake, M
    Chardaire, P
    McKeown, GP
    METAHEURISTICS: COMPUTER DECISION-MAKING, 2004, 86 : 19 - +
  • [2] Complex key generation with secured seed exchange for Vernam cipher in security applications
    Manjunatha, Vijayalaxmi
    Rao, Arjun
    Khan, Airani
    MATERIALS TODAY-PROCEEDINGS, 2021, 35 : 497 - 500
  • [3] Multiple Multidimensional Knapsack Problem and Its Applications in Cognitive Radio Networks
    Song, Yang
    Zhang, Chi
    Fang, Yuguang
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 3963 - 3969
  • [4] RSA public-key cipher algorithm and its applications in the information exchange
    Sun, Baolin
    Yang, Qiu
    Wu, Changhai
    Wuhan Jiaotong Keji Daxue Xuebao/Journal of Wuhan Transportation University, 2000, 24 (02): : 169 - 172
  • [5] Fully Polynomial Approximation Schemes for a Symmetric Quadratic Knapsack Problem and its Scheduling Applications
    Kellerer, Hans
    Strusevich, Vitaly A.
    ALGORITHMICA, 2010, 57 (04) : 769 - 795
  • [6] Fully Polynomial Approximation Schemes for a Symmetric Quadratic Knapsack Problem and its Scheduling Applications
    Hans Kellerer
    Vitaly A. Strusevich
    Algorithmica, 2010, 57 : 769 - 795
  • [7] Efficient private key generation from iris data for privacy and security applications
    Dash, Priyabrata
    Pandey, Fagul
    Sarma, Monalisa
    Samanta, Debasis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [8] A CLOSER VIEW OF RUNNING-KEY CIPHER ON NATURAL LANGUAGES AND ITS EXTENSION FOR NEW APPLICATIONS IN CRYPTOGRAPHY
    Vlad, Adriana
    Ilyas, Azeem
    Luca, Adrian
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 157 - 166
  • [9] Generation of maximum length non-binary key sequence and its application for stream cipher based on residue number system
    Sudeepa, K. B.
    Aithal, Ganesh
    JOURNAL OF COMPUTATIONAL SCIENCE, 2017, 21 : 379 - 386
  • [10] A Conflict-Based Model for Problem-Oriented Software Engineering and Its Applications Solved by Dimension Change and Use of Intermediary
    Hyun, Jung Suk
    Park, Chan Jung
    ADVANCES IN SOFTWARE ENGINEERING, PROCEEDINGS, 2009, 59 : 61 - +