[1]
R. H. Aswathy and N. Malarvizhi, “An investigation on cryptographic algorithms usage in IoT contexts”, IJET, vol. 7, no. 1.7, pp. 10–14, Feb. 2018, doi: 10.14419/ijet.v7i1.7.9379.