Author:
Srinath Shreyas,Nagaraja G S,Shahabadkar Ramesh
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Unveiling time utilization in resource constrained environment;2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS);2024-04-18
2. Analysis of Resource Utilization in Lightweight Cryptographic Algorithms;2024 International Conference on Cognitive Robotics and Intelligent Systems (ICC - ROBINS);2024-04-17
3. HCS: A Hybrid Data Security Enhancing Model Based on Cryptography Algorithms;Advances in Information Communication Technology and Computing;2023