1.
Evans TK, Popescu V, Ahmed S. A Comprehensive Review of Resource-Constrained Encryption Design with Hospital Information Systems: Security Models, Optimization Techniques, and Emerging Computing Applications. IJEECS [Internet]. 2025 Oct. 20 [cited 2026 Apr. 23];14(2):221-9. Available from: https://journals.mriindia.com/index.php/ijeecs/article/view/2140