Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography

e-Archivo Repository

Show simple item record

dc.contributor.author Isasi, Pedro
dc.contributor.author Hernández, Julio C.
dc.date.accessioned 2009-04-14T13:03:35Z
dc.date.available 2009-04-14T13:03:35Z
dc.date.issued 2004-08
dc.identifier.bibliographicCitation Computational Intelligence, 2004, vol. 20, n. 3, p. 445-449
dc.identifier.issn 0824-7935
dc.identifier.uri http://hdl.handle.net/10016/3945
dc.description.abstract Provides information on the applications of evolutionary computation in computer security and cryptography. Main applications of evolutionary computations in cryptology; Achievements of several researchers in the field of artificial intelligence applications to computer security and cryptology; Examples of successful research.
dc.format.mimetype application/pdf
dc.language.iso eng
dc.publisher Blackwell
dc.rights © Blackwell
dc.subject.other Cryptography
dc.subject.other Computer security
dc.subject.other Security systems
dc.subject.other Evolutionary computation
dc.subject.other Neural networks
dc.title Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography
dc.type article
dc.type.review PeerReviewed
dc.description.status Publicado
dc.relation.publisherversion http://dx.doi.org/10.1111/j.0824-7935.2004.00244.x
dc.subject.eciencia Informática
dc.identifier.doi 10.1111/j.0824-7935.2004.00244.x
dc.rights.accessRights openAccess
dc.identifier.publicationfirstpage 445
dc.identifier.publicationissue 3
dc.identifier.publicationlastpage 449
dc.identifier.publicationtitle Computational Intelligence
dc.identifier.publicationvolume 20
 Find Full text

Files in this item

*Click on file's image for preview. (Embargoed files's preview is not supported)


This item appears in the following Collection(s)

Show simple item record