Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography. Isasi, P. & Castro, J. C. H. Computational Intelligence, 20(3):445–449, 2004.
Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography [link]Paper  doi  bibtex   
@article{DBLP:journals/ci/IsasiC04,
  author    = {Pedro Isasi and
               Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
  title     = {Introduction to the Applications of Evolutionary Computation in Computer
               Security and Cryptography},
  journal   = {Computational Intelligence},
  volume    = {20},
  number    = {3},
  pages     = {445--449},
  year      = {2004},
  url       = {https://doi.org/10.1111/j.0824-7935.2004.00244.x},
  doi       = {10.1111/j.0824-7935.2004.00244.x},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ci/IsasiC04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0