Login / Signup

Symmetric and Asymmetric Encryption Algorithm Modeling on CPU Execution Time as Employed Over a Mobile Environment.

Ambili ThomasV. Lakshmi Narasimhan
Published in: Int. J. Nat. Comput. Res. (2021)
Keyphrases
  • mobile environments
  • encryption algorithm
  • mobile devices
  • mobile users
  • encryption algorithms
  • mobile computing
  • database
  • multimedia
  • data encryption
  • digital libraries
  • location based services