Institutional Repository

An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect

Files in this item

Copyright Statement

Items in UNISA Institutional Repository are protected by copyright, with all rights reserved, unless otherwise indicated. Items may only be viewed and downloaded for private research and study purposes. Please acknowledge publications according to acceptable standards and norms.

This item appears in the following Collection(s)

Search UnisaIR


Browse

My Account

Statistics