1.
Ambika.N. Securing the Network using Asymmetric Key. IJAREST [Internet]. 2015 Aug. 25 [cited 2026 Feb. 2];2(8):6-14. Available from: https://ijarest.org/index.php/ijarest/article/view/268