1. Konstantinides, J.M., Andreadis, I.: Performance analysis for canonical Huffman coding with fixed window size. Electron. Lett. 52(7), 525–527 (2016)
2. Ajagbe, S.A., Adesina, A.O., Oladosu, J.B.: Empirical evaluation of efficient asymmetric encryption algorithms for the protection of electronic medical records (EMR) on web application. Int. J. Sci. Eng. Res. 10(5), 848–871 (2019)
3. Ajagbe, S.A., Adesina, A.O., Odule, T.J., Aiyeniko, O.: Evaluation of computing resource consumption of selected symmetric-key algorithms. J. Comput. Sci. Appl. 26(2), 64–67 (2019)
4. Padmapriya, N., Tamilarasi, K., Kanimozhi, P., Ananth Kumar, T., Ajagbe, S.A.: A secure trading system using high-level virtual machine (HLVM) algorithm. In: 2022 International Conference on Smart Technologies and Systems for Next-Generation Computing (ICSTSN), pp. 1–4. IEEE (2022)
5. Zhang, R., Zhu, L., Xu, C., Yi, Y.: An efficient and secure RFID batch authentication protocol with group tags ownership transfer. In: Proceedings of the IEEE Conference Collaboration Internet Computing Hangzhou, China, pp. 168–175. IEEE (2015)