Last update: Sat Jan 6 02:03:49 MST 2018
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Yu:1989:DEB,
author = "K. W. Yu and T. L. Yu",
title = "Data encryption based upon time reversal
transformations",
journal = j-COMP-J,
volume = "32",
number = "3",
pages = "241--245",
month = jun,
year = "1989",
CODEN = "CMPJA6",
DOI = "https://doi.org/10.1093/comjnl/32.3.241",
ISSN = "0010-4620 (print), 1460-2067 (electronic)",
ISSN-L = "0010-4620",
bibdate = "Tue Dec 4 14:48:26 MST 2012",
bibsource = "http://comjnl.oxfordjournals.org/content/32/3.toc;
http://www.math.utah.edu/pub/tex/bib/compj1980.bib;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/",
URL = "http://comjnl.oxfordjournals.org/content/32/3/241.full.pdf+html;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/241.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/242.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/243.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/244.tif;
http://www3.oup.co.uk/computer_journal/hdb/Volume_32/Issue_03/tiff/245.tif",
acknowledgement = ack-nhfb,
affiliation = "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
classcodes = "B6120B (Codes); C6130 (Data handling techniques)",
classification = "B6120B (Codes); C6130 (Data handling techniques)",
corpsource = "Dept. of Appl. Sci., Hong Kong Polytech., Hong Kong",
fjournal = "The Computer Journal",
journal-URL = "http://comjnl.oxfordjournals.org/",
keywords = "computer network; Computer network; confidential data;
Confidential data; conservative system; Conservative
system; cryptography; data encryption model; Data
encryption model; dynamics; Dynamics; incomprehensible
form; Incomprehensible form; iterations; Iterations;
iterative methods; mechanical system; Mechanical
system; second order equations; Second order equations;
time reversal; Time reversal transformations;
transformations",
thesaurus = "Cryptography; Iterative methods",
treatment = "T Theoretical or Mathematical",
}
Related entries
- B6120B,
32(3)246
- based,
23(2)124,
23(2)142,
25(1)105,
25(4)471,
26(1)10,
27(1)67,
27(2)127,
27(4)368-1,
28(3)298,
29(4)340,
30(3)249,
30(5)469,
31(2)155,
31(6)481,
32(2)175,
32(4)297,
32(5)453,
32(5)461
- C6130,
31(6)503,
31(6)553,
31(6)557,
31(6)561,
32(1)13,
32(1)16,
32(3)238,
32(6)494,
32(6)505
- code,
23(1)46,
23(1)53,
23(1)66,
23(2)147,
23(3)212,
23(3)223,
24(4)324,
25(3)316,
25(4)442,
26(4)303,
26(4)375,
27(3)246,
27(4)354,
27(4)368-1,
28(3)343,
28(4)379,
29(1)12,
29(1)60,
29(4)307,
29(5)472,
29(6)573,
30(1)87,
30(2)149,
30(6)541,
30(6)569,
31(6)517,
32(2)152,
32(3)228,
32(3)246,
32(3)276
- cryptography, 25-3-400c-400,
26(1)68,
28(3)343,
29(4)289,
31(6)503,
32(1)13,
32(5)470
- dynamic,
23(1)53,
23(2)115,
23(2)147,
23(4)298,
24(4)383-1,
25(1)63,
25(2)199,
25(3)358,
25(3)388,
25(4)478,
26(1)25,
27(1)87,
27(2)135,
27(2)143,
27(3)284,
27(3)284-1,
27(4)328,
28(2)170,
28(3)250,
28(3)330,
29(1)52,
29(2)127,
29(2)182,
29(2)189,
29(2)189-1,
30(2)119,
30(3)258,
30(6)541,
31(4)296,
31(5)457,
31(6)531,
32(1)16,
32(3)194
- encryption,
28(3)343,
29(4)289
- equation,
23(1)85,
23(2)186,
23(3)233,
23(3)274,
24(1)87,
24(2)180,
24(2)184,
25(1)56,
27(2)184,
30(2)189,
30(3)258,
32(5)399
- form,
23(4)324,
25(4)471,
26(1)52,
26(3)235,
26(4)312,
26(4)366,
26(4)375,
27(3)225,
28(2)117,
29(3)201,
30(1)43,
30(5)437,
31(3)258,
32(5)422,
32(6)549
- handling,
23(2)147,
24(1)3,
24(1)17,
24(1)42,
24(2)97,
24(2)130,
25(3)347,
25(4)448,
25(4)486,
26(3)205,
28(2)117,
29(5)477-1,
30(3)277,
30(6)569,
31(1)61,
31(2)133,
31(6)503,
31(6)553,
31(6)557,
31(6)561,
32(1)13,
32(1)16,
32(3)238,
32(5)386,
32(6)494,
32(6)505
- iteration,
25(2)207,
27(2)171
- iterative,
25(1)56,
25(1)116,
26(2)187,
27(3)278,
30(1)70,
30(2)189,
30(4)376,
31(3)269,
32(1)93,
32(2)187,
32(3)281
- mechanical,
23(4)324
- method,
22(2)105,
24(2)139,
24(2)190,
24(3)230,
24(4)320,
25(1)7,
25(1)56,
25(1)61,
25(3)327,
25(3)353,
26(1)6,
26(2)187,
26(3)199,
26(3)283,
27(3)218,
27(3)238,
28(2)112,
28(2)184,
28(3)330,
28(4)372,
28(4)379,
28(4)417,
28(4)433,
28(4)444,
28(5)498,
29(2)97,
29(2)118,
29(2)167,
29(5)416,
29(5)434,
30(1)70,
30(2)149,
30(2)163,
30(2)189,
30(3)268,
30(3)277,
30(4)289,
30(4)295,
30(4)316,
30(4)337,
30(4)376,
30(6)535,
31(1)83,
31(6)510,
31(6)565,
31(6)570,
32(1)93,
32(2)108,
32(2)142,
32(2)187,
32(3)220,
32(3)238,
32(3)281,
32(4)305,
32(4)374,
32(4)377,
32(5)385,
32(5)432,
32(6)563
- order,
23(2)186,
24(1)83,
24(2)180,
26(1)92,
26(3)205,
26(3)224,
27(1)37,
27(4)373,
28(3)309,
30(3)282,
30(3)282-1,
30(5)425,
30(6)569,
31(1)61,
32(1)16,
32(2)98,
32(5)461
- reversal,
31(4)325
- second,
23(3)274,
24(2)180,
26(2)192-1,
27(4)368-1,
32(2)142
- time,
23(1)34,
23(2)147,
23(2)153,
23(3)262,
23(4)290,
24(1)85,
24(2)156,
25(1)32,
25(1)45,
25(2)193,
25(4)429,
26(2)154,
26(3)224,
26(4)293,
26(4)320,
27(1)27,
27(3)201,
27(3)246,
27(3)254,
27(4)368-1,
28(1)9,
28(1)54,
28(1)78,
28(2)105,
28(3)309,
28(4)409,
28(4)412,
29(1)47,
29(1)52,
29(2)103,
29(2)118,
29(2)176,
29(3)229,
29(3)269,
29(5)390,
29(5)396,
29(5)436,
30(3)249,
30(4)362,
30(4)372,
30(4)376,
30(5)475,
30(6)519,
30(6)535,
31(3)243,
31(3)279,
31(3)283,
31(6)496,
31(6)545,
31(6)553,
32(3)212,
32(3)228,
32(4)374,
32(5)474
- transformation,
23(1)61,
23(2)161,
23(4)344,
24(3)271,
27(4)301,
28(5)530,
29(2)171,
30(1)37,
30(1)43,
30(2)149,
30(6)498,
30(6)512,
31(3)229,
31(3)269,
31(6)517,
32(2)127,
32(5)445
- upon,
30(3)249