|
by Abd el-Samie, Fathi E., Ahmed, Hossam Eldin H., Elashry, Ibrahim F., Shahieen, Mai H.
Published 2014
“..., evaluates, and compares, with respect to security level and encryption speed algorithms that fall...”Published 2014
CRC Press