Author:
Yenuguvanilanka Jyothi,Elkeelany Omar
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Cloud through the Implementation of Encryption Algorithms- A Comprehensive Study;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05
2. Advanced Encryption Standard to Prevent Intruders in Email through Cloud Environment;2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2023-05-04
3. AESPIE: Raspberry Pi AES Performance Evaluation Using Image Encryption in C and Python;Springer Proceedings in Earth and Environmental Sciences;2023
4. End-to-End Encryption and Prediction of Medical Insurance Cost;2022 6th International Conference on Trends in Electronics and Informatics (ICOEI);2022-04-28
5. Enhanced Security using Advanced Encryption Standards in Face Recognition;2021 2nd International Conference on Communication, Computing and Industry 4.0 (C2I4);2021-12-16