Vol-3170⫷ Vol-3171 ⫸Vol-3172
urn:nbn:de:0074-3171-0


Vol-3171/paper65⫷Vol-3171/paper66⫸Vol-3171/paper67

Method of Training and Implementation on the Basis of Neural Networks of Cryptographic Data Protection