Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Lidl, Rudolf
and
Müller, Winfried B.
1984.
Advances in Cryptology.
p.
293.
Piper, Fred
1988.
Performance Limits in Communication Theory and Practice.
p.
207.
Cusick, Thomas W.
1997.
Security Protocols.
Vol. 1189,
Issue. ,
p.
111.
Chmielowiec, Andrzej
2010.
Fixed points of the RSA encryption algorithm.
Theoretical Computer Science,
Vol. 411,
Issue. 1,
p.
288.
Maqbool, Saqib
Ahmad, Nisar
Muhammad, Aslam
and
Martinez Enriquez, A. M.
2016.
Pattern Recognition.
Vol. 9703,
Issue. ,
p.
145.
Cheema, Paramjeet
and
Julka, Neeraj
2017.
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments.
Vol. 10618,
Issue. ,
p.
84.
Sánchez-Arias, Gonzalo
González García, Cristian
and
Pelayo G-Bustelo, B. Cristina
2017.
Midgar: Study of communications security among Smart Objects using a platform of heterogeneous devices for the Internet of Things.
Future Generation Computer Systems,
Vol. 74,
Issue. ,
p.
444.
Martin, Tchoffo
Giresse, Tene Alain
and
Yannick, Djebayole Mimbe III
2020.
Triggering parametric-down conversion-based quantum key distribution via radiation field.
International Journal of Quantum Information,
Vol. 18,
Issue. 06,
p.
2050037.
Ahmad, Nisar
Younus, Muhammad Usman
Anjum, Muhammad Rizwan
Saleem, Gulshan
Gondal, Zaheer Ahmed
and
Narejo, Sanam
2022.
Efficient JPEG Encoding Using Bernoulli Shift Map for Secure Communication.
Wireless Personal Communications,
Vol. 125,
Issue. 4,
p.
3405.