1. Ignacio Algredo-Badillo, R. Castillo-Soria, Kelsey A. RamíRez-GutiéRrez, Luis Morales-Rosales, Alejandro Medina-Santiago, Lightweight Security Hardware Architecture Using DWT and AES Algorithms, IEICE Transaction on Information & System, 101(11), pp. 345–356 (2018).
2. Jaspreet Kaur, Er. Sumit Sharma, Secure Image Sharing on Cloud using Cryptographic Algorithms: Survey, International Journal on Future Revolution in Computer Science & Communication Engineering, 4(2), pp. 319–325 (2018).
3. An overview of steganography techniques applied to the protection of biometric data
4. A. Vithya Vijayalakshmi, N. Veeraragavan and L. Arockiam, A Unified Model for Cloud Data Confidentiality, Asian Journal of Science and Applied Technology, 7(1), pp. 23–27 (2018).
5. ZuraineeMohd Tahir, Haryani Haron, Jasber Kaur, Ubiquitous Learning Environment and Technologies: A Review, International Journal of Engineering & Technology, 7(3), pp. 31–35 (2018).