Author:
Tharakan Linoy A.,Daniel Sherly,Dhanasekaran R.
Reference26 articles.
1. Lv, Z., Ota, K., Lloret, J., Xiang, W., Bellavista, P.: Complexity problems handled by big data technology. Complexity 2019, 7, Article ID 9090528 (2019). https://doi.org/10.1155/2019/9090528
2. Zhang, X., Wang, S., Cong, G., Cuzzocrea, A.: Social big data: mining, applications, and beyond. Complexity 2019, 2, Article ID 2059075. https://doi.org/10.1155/2019/2059075
3. Kumari, S.: A research paper on cryptography encryption and compression techniques. Int. J. Eng. Comput. Sci. 4(4), 20915–20919 (2017). Accessed on 11/09/2020 at https://www.ijecs.in/index.php/ijecs/article/download/3630/3378/
4. Tharakan, L.A., Dhanasekaran, R.: Security enabled energy efficient middleware for WSN. In: IEEE International Conference on Advanced Communications, Control and Computing Technologies (2015). https://doi.org/https://doi.org/10.1109/ICACCCT.2014.7019201
5. Liestyowati, D.: Public key cryptography. J. Phys. IOP Publishing Conf. Ser. 1477, 052062 (2020). Accessed on 11/09/2020 at https://iopscience.iop.org/article/10.1088/1742-6596/1477/5/052062/pdf
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献