has been cited by the following article(s):
[1]
|
Securing data in Wireless Sensor Network using Hybrid ECC + AES Cryptographic Approach
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES),
2023
DOI:10.1109/ICSES60034.2023.10465343
|
|
|
[2]
|
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Symmetry,
2020
DOI:10.3390/sym13010045
|
|
|
[3]
|
Lightweight and authenticated key exchange based on self linear pairings
Materials Today: Proceedings,
2020
DOI:10.1016/j.matpr.2020.10.917
|
|
|
[4]
|
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Symmetry,
2020
DOI:10.3390/sym13010045
|
|
|
[5]
|
Soft Computing: Theories and Applications
Advances in Intelligent Systems and Computing,
2018
DOI:10.1007/978-981-10-5687-1_4
|
|
|
[6]
|
Legal hurdles for gastroenterologists in India
Indian Journal of Gastroenterology,
2017
DOI:10.1007/s12664-017-0754-4
|
|
|