Author:
Bhat Sourabh,Kapoor Vivek
Reference9 articles.
1. W. Stallings, Cryptography and Network Security, 3rd edn. (Prentice-Hall Inc., 2005)
2. K. Kaur, E. Seema, Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices. Int. J. Eng. Res. Appl. (IJERA) 2(5) (2012)
3. S. Sharma, V. Kapoor, A novel approach for improving security by digital signature and image steganography. Int. J. Comput. Appl. 171(8) (2017)
4. S. Subasree, N.K. Sakthivel, Design of a new security protocol using hybrid cryptographic algorithm. IJRRAS 2(2) (2010)
5. D.V. Kapoor, R. Yadav, A hybrid cryptography technique to support cyber security infrastructure. Int. J. Adv. Res. Comput. Eng. Technol. 4(11) (2015)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献