"Peter Parker" <[EMAIL PROTECTED]> writes:
>In one of the issue of ijde found at
>http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have analysed
>various encryption applications and discussed results for few sample
>applications. Does any one have the complete results. Tried mailing th
Hi,
In one of the issue of ijde found at
http://www.ijde.org/docs/04_winter_v2i3_art1.pdf the authors have
analysed various encryption applications and discussed results for few
sample applications. Does any one have the complete results. Tried
mailing the author but no response. Any one having fu