Author:
Reddy Dugimpudi Abhishek,Yadav Deepak,Yadav Nishi,Singh Devendra Kumar
Publisher
Springer International Publishing
Reference16 articles.
1. Santoso, P.P., Rilvani, E., Trisnawan, A.B., Adiyarta, K., Napitupulu, D., Sutabri, T., Rahim, R.: Comparison study of symmetric key and asymmetric key algorithm. In: IOP Conference Series: Materials Science and Engineering Published under licence by IOP Publishing Ltd, vol. 420
2. Devi, T.R.: Importance of Cryptography in Network Security. In: 2013 International Conference on Communication System and Information Technology (2013)
3. Gupta, A., Gupta, S., Yadav, N.: Enhancement of security using B-RSA algorithm. In: International Conference on Inventive Computational Technologies (ICICCT 2019). Springer
4. Manu and AartiGoel: ABES Engineering College Ghaziabad, India, 3rd IEEE International Conference on “Computational Intelligence and Communication Technology” (IEEE-CICT 2017)
5. Ekka, D., Kumari, M., Yadav, N.: Enrichment of security using hybrid algorithm. In: International Conference on Computer Networks and Communication Technologies. Springer, Singapore (2019)