Author:
Gurav Yogesh B.,Patil Bankat M.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Science Applications
Reference33 articles.
1. Ali, R., Ak, P.: A secure three-factor remote user authentication scheme using elliptic curve cryptosystem. In: Proceedings of the international conference on microelectronics, Computing and communication systems, pp. 9–24. Springer, Singapore (2018a)
2. Ali, R., Pal, A.K.: An efficient three factor–based authentication scheme in multiserver environment using ECC. Int. J. Commun. Syst. 31(4), e3484 (2018b)
3. Alqahtani, F., Salahaldeen, D., Predrag, T.T., Frederick, T.S.: Information flow control to secure data in the cloud. In: International Conference on Computational Science and Computational Intelligence (CSCI) (2020)
4. Anandkumar, R., Kalpana, R.: A review on chaos-based image encryption using fractal function. Exam Fractal Image Process. Anal. 23–37 (2020)
5. Anandkumar, R., Kalpana, R.: A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm. J. Ambient. Intell. Humaniz. Comput. 13, 3713–3727 (2022)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献