Funder
University Grants Commission - South Eastern Regional Office
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference49 articles.
1. Abdulraheem M, Awotunde JB, Jimoh RG, Oladipo ID. An efficient lightweight cryptographic algorithm for IoT security. In the proceedings of ICTA,. Springer. Cham. 2020;2021(1350):444–56.
2. Aboud S J. Group signature system using multivariate asymmetric cryptography. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics Copyright. IGI Global. 2017; pages 15.
3. Ajagbe SA, Adesina AO. Design and development of an access control based electronic medical record (EMR). Centerpoint Journal, University of llorin (Nigeria). 2020;2020008; pp. 26108.
4. Ajagbe SA, Florez H, Awotunde JB (2022). AESRSA: a new cryptography key for electronic health record security. Applied Informatics: 5th International Conference, ICAI. Springer. Cham. 2022;2022(1643):237–51.
5. Ajagbe SA, Adesina A, Oladosu J. Empirical evaluation of efficient asymmetric encryption algorithms for the protection of electronic medical records (emr) on web application. Int J Sci Eng Res. 2019;10(5):848–71.