Author:
Kushwaha Ajay,Sharma Hari Ram,Ambhaikar Asha
Publisher
Springer International Publishing
Reference11 articles.
1. Boukerche A, Mokdad L, Ren Y (2011) Performance analysis of a selective encryption algorithm for wireless ad hoc networks. In: Wireless communications and networking conference, IEEE, pp 1038–1043
2. Matin MA, Hossain MM, Islam MF, Islam MN, Hossain MM (2009) Performance evaluation of symmetric encryption algorithm in MANET and WLAN. In: International conference for Technical Postgraduates (TECHPOS), IEEE, Kuala Lumpur, pp. 1–4
3. Mishra S, Bhattacharjya A (2013) Pattern analysis of cipher text: a combined approach. In: International Conference on Recent Trends in Information Technology (ICRTIT), IEEE, pp 393–398
4. Zhou X, Tang X (2011) Research and mplementation of RSA algorithm for encryption and decryption. In: International Conference on Strategic Technology (IFOST), IEEE, pp 1118–1121
5. Umaparvathi M, Varughese DK (2010) Evaluation of symmetric encryption algorithms for MANETs. In: International Conference on Computational Intelligence and Computing Research (ICCIC), IEEE, Coimbatore, pp 1–3
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献