Entry Yu:1989:DEB from compj1980.bib

Last update: Sat Jan 6 02:03:49 MST 2018                Valid HTML 3.2!

Index sections

Top | Symbols | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Yu:1989:DEB,
  author =       "K. W. Yu and T. L. Yu",
  title =        "Data encryption based upon time reversal
                 transformations",
  journal =      j-COMP-J,
  volume =       "32",
  number =       "3",
  pages =        "241--245",
  month =        jun,
  year =         "1989",
  CODEN =        "CMPJA6",
  DOI =          "https://doi.org/10.1093/comjnl/32.3.241",
  ISSN =         "0010-4620 (print), 1460-2067 (electronic)",
  ISSN-L =       "0010-4620",
  bibdate =      "Tue Dec 4 14:48:26 MST 2012",
  bibsource =    "http://comjnl.oxfordjournals.org/content/32/3.toc;
                 http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/",
  URL =          "http://comjnl.oxfordjournals.org/content/32/3/241.full.pdf+html;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/241.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/242.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/243.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/244.tif;
                 http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/245.tif",
  acknowledgement = ack-nhfb,
  affiliation =  "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
  classcodes =   "B6120B (Codes); C6130 (Data handling techniques)",
  classification = "B6120B (Codes); C6130 (Data handling techniques)",
  corpsource =   "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
  fjournal =     "The Computer Journal",
  journal-URL =  "http://comjnl.oxfordjournals.org/",
  keywords =     "computer network; Computer network; confidential data;
                 Confidential data; conservative system; Conservative
                 system; cryptography; data encryption model; Data
                 encryption model; dynamics; Dynamics; incomprehensible
                 form; Incomprehensible form; iterations; Iterations;
                 iterative methods; mechanical system; Mechanical
                 system; second order equations; Second order equations;
                 time reversal; Time reversal transformations;
                 transformations",
  thesaurus =    "Cryptography; Iterative methods",
  treatment =    "T Theoretical or Mathematical",
}

Related entries