Author:
Singh Umesh Pal,Chauhan Naveen
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Performance analysis of NTRU algorithm with non-post-quantum algorithms;Journal of Discrete Mathematical Sciences and Cryptography;2021-07-04
2. Authentication in opportunistic networks: State and art;Journal of Discrete Mathematical Sciences and Cryptography;2021-04-15
3. Randomized Authentication using IBE for Opportunistic Networks;49th International Conference on Parallel Processing - ICPP : Workshops;2020-08-17