Comparative methods for the polynomial isolation

  • Authors:
  • Calin Alexe Muresan

  • Affiliations:
  • Department of Mathematics, Faculty of Letters and Science, University Petroleum and Gas of Ploiesti, Ploiesti, Prahova, Romania

  • Venue:
  • ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

As the sophistication of intruders' increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an ...