A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery
Vol. 42, No. 1, pp. 250-256, Jan. 2017
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
J. Y. Lee and N. S. Chang, "A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 250-256, 2017. DOI: .
[ACM Style]
Jun Yeong Lee and Nam Su Chang. 2017. A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery. The Journal of Korean Institute of Communications and Information Sciences, 42, 1, (2017), 250-256. DOI: .
[KICS Style]
Jun Yeong Lee and Nam Su Chang, "A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 250-256, 1. 2017.