Author:
Shah Asif A.,Parah Shabir A.,Rashid Mamoon,Elhoseny Mohamed
Publisher
Springer Science and Business Media LLC
Reference58 articles.
1. Kim, M., Lee, H.T., Ling, S., Tan, B.H.M., Wang, H.: Private compound wildcard queries using fully homomorphic encryption. IEEE Trans. Depend. Secure. Comput. 16(5), 743–756 (2017)
2. Hellman, M.: An overview of public-key cryptography. IEEE Commun. Soc. Mag. 16(6), 24–32 (1978)
3. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
4. Navnish, G., Amitabh, M., Babloo, K.: Information security: encryption and decryption with polyalphabetic substitution. Int. J. Comput. Sci. Commun. 2(1), 1–4 (2011)
5. Stallings, W.: Cryptography and network security: principles and practice. Pearson Education India, Bengaluru (2003)
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献