Author:
Gnana Sambandam K.,Kamalanaban Ethala
Reference16 articles.
1. Zhou Z, Wu C, Yang Z, Liu Y (2015) Sensorless sensing with WiFi, vol 20, no. 1. Tsinghua Science and Technology, Feb 2015, pp 1–6. ISSN 1007-0214 01/11
2. Anand D, Khemchandani V, Sharma RK (2013) Identity-based cryptography techniques and applications (a review). 5th international conference on computational intelligence and communication networks (CICN), 27–29 Sept 2013, pp 343–348
3. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
4. Kapoor V, Abraham VS, Singh R (2008) Elliptic curve cryptography. ACM Ubiquity 9(20)
5. Han S-J, Oh H-S, Park J (1996) The improved data encryption standard (DES) algorithm. IEEE 4th international symposium on spread spectrum techniques and applications proceedings, vol 3, pp 1310–1314
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献