Author:
Shukla Varun,Misra Manoj Kumar,Dixit Shivani,Dhumras Himanshu
Publisher
Springer Nature Singapore
Reference41 articles.
1. Menezes AJ, Oorschot PCV, Vanstone SA (2001) Handbook of applied cryptography, 5th edn. CRC Press Inc, USA, ISBN: 9780849385230
2. Stallings W (2005) Cryptography and network security, principles and practices, 7th edn. Prentice Hall, ISBN-13:978-0134444284, ISBN-10:0134444280
3. Shukla V, Chaturvedi A, Srivastava N (2019) Nanotechnology and cryptographic protocols: issues and possible solutions. Nanomater Energy 8(1):1–6. https://doi.org/10.1680/jnaen.18.00006
4. Shukla V, Chaturvedi A, Srivastava N (2019) A secure stop and wait communication protocol for disturbed networks. Wirel Pers Commun 110:861–872. https://doi.org/10.1007/s11277-019-06760-w
5. Shukla V, Srivastava N, Chaturvedi A (2016) A bit commitment signcryption protocol for wireless transport layer security (wtls). In: IEEE international conference on electrical, computer and electronics engineering, pp 83–86. https://doi.org/10.1109/UPCON.2016.7894629