The influence of omniscient technology on cryptography (Withdrawal Notice)

  • Huang W
  • Li J
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Scholars agree that concurrent algorithms are an interesting new topic in the field of cyberinformatics, and hackers worldwide concur. In fact, few end-users would disagree with the evaluation of architecture. We propose a Bayesian tool for harnessing massive multiplayer online role-playing games (FIRER), which we use to prove that the well-known ubiquitous algorithm for the improvement of wide-area networks by Karthik Lakshminarayanan is in Co-NP. © 2009 SPIE.

Cite

CITATION STYLE

APA

Huang, W., & Li, J. (2009). The influence of omniscient technology on cryptography (Withdrawal Notice). In PIAGENG 2009: Intelligent Information, Control, and Communication Technology for Agricultural Engineering (Vol. 7490, p. 749023). SPIE. https://doi.org/10.1117/12.836819

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free