Login / Signup
Encryption and Decryption of Mobile Security Using AES and GOST Algorithms.
Muhammad Ilyas
Talha Naqash
Sajjad Hussain Shah
Published in:
UEMCON (2018)
Keyphrases
</>
computationally efficient
computational complexity
learning algorithm
optimization problems
theoretical analysis
efficient implementation
decision trees
database systems
computational cost
mobile phone
context aware
intrusion detection
security requirements