Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography. Isasi, P. & Castro, J. C. H. Computational Intelligence, 20(3):445–449, 2004.
Paper doi bibtex @article{DBLP:journals/ci/IsasiC04,
author = {Pedro Isasi and
Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
title = {Introduction to the Applications of Evolutionary Computation in Computer
Security and Cryptography},
journal = {Computational Intelligence},
volume = {20},
number = {3},
pages = {445--449},
year = {2004},
url = {https://doi.org/10.1111/j.0824-7935.2004.00244.x},
doi = {10.1111/j.0824-7935.2004.00244.x},
timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/bib/journals/ci/IsasiC04},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"37FAijemHvDn3PSPQ","bibbaseid":"isasi-castro-introductiontotheapplicationsofevolutionarycomputationincomputersecurityandcryptography-2004","downloads":0,"creationDate":"2019-02-03T11:43:26.999Z","title":"Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography","author_short":["Isasi, P.","Castro, J. C. H."],"year":2004,"bibtype":"article","biburl":"https://raw.githubusercontent.com/sa-mooc-uc3m/mooc-research-public/master/trunk/bibtex/KR-EVANNAI.bib","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Pedro"],"propositions":[],"lastnames":["Isasi"],"suffixes":[]},{"firstnames":["Julio","César","Hernández"],"propositions":[],"lastnames":["Castro"],"suffixes":[]}],"title":"Introduction to the Applications of Evolutionary Computation in Computer Security and Cryptography","journal":"Computational Intelligence","volume":"20","number":"3","pages":"445–449","year":"2004","url":"https://doi.org/10.1111/j.0824-7935.2004.00244.x","doi":"10.1111/j.0824-7935.2004.00244.x","timestamp":"Mon, 05 Jun 2017 01:00:00 +0200","biburl":"https://dblp.org/rec/bib/journals/ci/IsasiC04","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ci/IsasiC04,\n author = {Pedro Isasi and\n Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro},\n title = {Introduction to the Applications of Evolutionary Computation in Computer\n Security and Cryptography},\n journal = {Computational Intelligence},\n volume = {20},\n number = {3},\n pages = {445--449},\n year = {2004},\n url = {https://doi.org/10.1111/j.0824-7935.2004.00244.x},\n doi = {10.1111/j.0824-7935.2004.00244.x},\n timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},\n biburl = {https://dblp.org/rec/bib/journals/ci/IsasiC04},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Isasi, P.","Castro, J. C. H."],"key":"DBLP:journals/ci/IsasiC04","id":"DBLP:journals/ci/IsasiC04","bibbaseid":"isasi-castro-introductiontotheapplicationsofevolutionarycomputationincomputersecurityandcryptography-2004","role":"author","urls":{"Paper":"https://doi.org/10.1111/j.0824-7935.2004.00244.x"},"downloads":0,"html":""},"search_terms":["introduction","applications","evolutionary","computation","computer","security","cryptography","isasi","castro"],"keywords":[],"authorIDs":[],"dataSources":["2B6J8ki54TjHDxweq"]}