"Peter Parker" <[EMAIL PROTECTED]> writes:

>In one of the issue of ijde found at
>http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed
>various encryption applications and discussed results for few sample
>applications. Does any one have the complete results. Tried mailing the
>author but no response. Any one having further info.

To save people downloading the PDF, it's an 11-page article that reinvents
the 'file' command.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to