"Peter Parker" <[EMAIL PROTECTED]> writes: >In one of the issue of ijde found at >http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed >various encryption applications and discussed results for few sample >applications. Does any one have the complete results. Tried mailing the >author but no response. Any one having further info.
To save people downloading the PDF, it's an 11-page article that reinvents the 'file' command. Peter. --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
