[1]
T. K. Evans, V. Popescu, and S. Ahmed, “A Comprehensive Review of Resource-Constrained Encryption Design with Hospital Information Systems: Security Models, Optimization Techniques, and Emerging Computing Applications”, IJEECS, vol. 14, no. 2, pp. 221–229, Oct. 2025.