S Jaiswal,
D Gupta - … of International Conference on Communication and …, 2017 - Springer
… , and others effectively and identifies the optimal security algorithm. Our framework first
determines the security requirements during requirement phase by analyzing the existing or …