Author of the publication

Enhanced tiny encryption algorithm for secure electronic health authentication system.

, , and . Int. J. Inf. Priv. Secur. Integr., 3 (3): 230-252 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Two-Way Loop Algorithm for Exploiting Instruction-Level Parallelism in Memory System., , , , and . ICCSA (5), volume 8583 of Lecture Notes in Computer Science, page 255-264. Springer, (2014)Enhanced tiny encryption algorithm for secure electronic health authentication system., , and . Int. J. Inf. Priv. Secur. Integr., 3 (3): 230-252 (2018)Privacy Preservation in Mobile-Based Learning Systems: Current Trends, Methodologies, Challenges, Opportunities and Future Direction., , , and . ICTA, volume 1350 of Communications in Computer and Information Science, page 520-534. Springer, (2020)Paillier Cryptosystem Based ChainNode for Secure Electronic Voting., , , and . Frontiers Blockchain, (July 2022)Developing Smart Car Parking System Using Wireless Sensor Networks., , , and . OcRI, volume 1755 of CEUR Workshop Proceedings, page 201-206. CEUR-WS.org, (2016)Pastoralist Optimization Algorithm (POA): A Culture-Inspired Metaheuristic for Uncapacitated Facility Location Problem (UFLP)., , , and . HIS, volume 1375 of Advances in Intelligent Systems and Computing, page 740-749. Springer, (2020)DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps., , , and . Comput. Secur., (2024)Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions., , , and . J. Reliab. Intell. Environ., 7 (2): 115-143 (2021)Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices., , , and . ICTA, volume 1350 of Communications in Computer and Information Science, page 415-429. Springer, (2020)A Secure Electronic Prescription System Using Steganography with Encryption Key Implementation., , , and . CoRR, (2015)