[1]
Ambika.N, “Securing the Network using Asymmetric Key”, IJAREST, vol. 2, no. 8, pp. 6–14, Aug. 2015.