

Tamil Data Communication Security Using Elliptic Curve Cryptography Key Algorithms
Abstract
Keywords
References
Andrew S. Tanenbaum “ Computer Networks “, Fourth Edition, PHI
Diffie, W., Hellmann, M.E. (1976). New directions in Cryptography. IEEE Transactions in Information Theory, 22, 644-654.
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathematics of Computation, 48,203-209.
A. Banerjee, I. Dhillon, J. Ghosh, S. Merugu, and D. S. Modha. A generalized maximum entropy approach to bregman co-clustering and matrix approximation. Journal of Machine Learning Research, 8:1919–1986, Aug.2007
R. Niels and L. Vuurpijl. Dynamic TimeWarping Applied to Tamil Character Recognition.Proceedings of the 8th International Conference on Document Analysis and Recognition, 2005.
R. M. Suresh, L. Ganesan, "Recognition of Printed and Handwritten Tamil Characters Using Fuzzy Approach," iccima, pp.291-286, Sixth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA'05),2005, DOI:http://doi.ieeecomputersociety.org/10.1109/ICCIMA 2005.47
M. Jambyu and M. O. Lebeaux. Cluster Analysis and Data Analysis. North- Holland, 1983.
Open source materials -Apertium (http://www.apertium.org/) BLEU kit (ftp://jaguar.ncsl.nist.go/mt/resources/mteval-v13.pl)GIZA (http://www.fjoch.com/GIZA++.html)
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.