Cited By
View all- Sasikala TRao KReddaiah BKumar B(2024)Hybrid Cryptosystem using Lattice Permutation and Chaos Logistic Mapping for Image SecurityInternational Journal of Engineering and Advanced Technology10.35940/ijeat.D4441.1304042413:4(34-38)Online publication date: 30-Apr-2024
- Kumar MDutta NAnamalamudi S(2024)Privacy Mechanisms for Content-Centric Network Protecting Content Names and Content Data2024 6th International Conference on Computational Intelligence and Networks (CINE)10.1109/CINE63708.2024.10881279(1-7)Online publication date: 19-Dec-2024
- Daniel ETschorsch F(2024)Exploring the design space of privacy-enhanced content discovery for bitswapComputer Communications10.1016/j.comcom.2024.01.029217(12-24)Online publication date: Mar-2024
- Show More Cited By