[Other] Authentication model for secure data access using blowfish and elliptic curve diffie hellman key exchange algorithm

saravanan21 Post time 2024-5-4 21:54:01 | Show all posts |Read mode
Reward20points

journal£ºINTERNATIONAL CONFERENCE ON ELECTRONICS, ENGINEERING PHYSICS, AND EARTH SCIENCE

Authors£ºE. Padma; C. K. Gomathy

Published date£º2024--

DOI£º10.1063/5.0198869

PDF link£ºhttp://aip.scitation.org/doi/pdf/10.1063/5.0198869

Article link£ºhttp://dx.doi.org/10.1063/5.0198869

Article Source£ºAIP Publishing¡£


Remark£º

Best Answer

Reply

Use magic Donate Report

All Reply1 Show all posts
Georgee Post time 2024-5-4 21:54:02 | Show all posts

This post has been completed

Completed attachments will be deleted within 24 hours.
Reply

Use magic Donate Report

Intermediate member
  • post

  • reply

  • points

    440

Latest Reply

Return to the list