[1]
Evans, T.K. et al. 2025. A Comprehensive Review of Resource-Constrained Encryption Design with Hospital Information Systems: Security Models, Optimization Techniques, and Emerging Computing Applications. International Journal of Electrical, Electronics and Computer Systems. 14, 2 (Oct. 2025), 221–229.