Neural cryptography: Difference between revisions

Content deleted Content added
Applications: Removed personal opinion
Tags: Mobile edit Mobile web edit
Monkbot (talk | contribs)
m References: Task 16: replaced (1×) / removed (0×) deprecated |dead-url= and |deadurl= with |url-status=;
Line 138:
* [http://www.opus-bayern.de/uni-wuerzburg/volltexte/2007/2361/ Neural Synchronization and Cryptography] - Andreas Ruttor. PhD thesis, Bayerische Julius-Maximilians-Universität Würzburg, 2006.
* {{cite journal |last1=Ruttor |first1=Andreas |last2=Kinzel |first2=Wolfgang |last3=Naeh |first3=Rivka |last4=Kanter |first4=Ido |date=March 2006 |title=Genetic attack on neural cryptography |journal=Physical Review E |volume=73 |issue=3 |pages=036121 |issn=1539-3755 |doi=10.1103/PhysRevE.73.036121|pmid=16605612 |arxiv=cond-mat/0512022 |bibcode=2006PhRvE..73c6121R }}
* {{cite journal | author=Khalil Shihab | year=2006 | title=A backpropagation neural network for computer network security | journal=Journal of Computer Science 2 | pages=710–715 | url=http://www.scipub.org/fulltext/jcs/jcs29710-715.pdf | deadurlurl-status=yesdead | archiveurl=https://web.archive.org/web/20070712012959/http://www.scipub.org/fulltext/jcs/jcs29710-715.pdf | archivedate=2007-07-12 | df= }}
{{Cryptography navbox}}