Author:
Verma Raksha,Nagar Tavishi,Sharma Manoj Kumar,Kumar Mukesh
Reference12 articles.
1. Dorothy E. Denning and Peter J. Denning, Data Security (ACM Computing Surveys, New York, 11(3), (1979) 227–249.
2. H. Beker and F. Piper, “Communications Survey: a survey of Cryptography”, (IEE Proc. A, 1982), 357–376.
3. Ravindra Babu Kallam, Susarla Udaya Kumar and Dr. A. Vinaya Babu, “A Survey on cryptography and Steganography methods for information security”, (IJCA, 12 (2), (2010) 0975–8887
4. Atul Kahate, Cryptography and Network Security, 4th edition, (Tata McGraw-Hill, New Delhi, 2019).
5. D.V. Tassel, Cryptographic techniques for computers: Substitution methods, (Pergamon press, Britain, 1970) 241–249.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献