Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Isra Mohamed Ali"'
Publikováno v:
ACM Computing Surveys. 53:1-38
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of
Publikováno v:
SSRN Electronic Journal.
Classifying a weapon based on its muzzle blast is a challenging task that has significant applications in various security and military fields. Most of the existing works rely on ad-hoc deployment of spatially diverse microphone sensors to capture mu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ae2e2133ff4810aab42e28e9712236b9