[1]
M. A. . Saare, M. N. . Jawad, M. A. . Al-Shareeda, M. A. . Almaiah, and M. . Obeidat, “Evaluating elliptic curve cryptography in constrained environments: A Raspberry Pi-based approach”, ijirss, vol. 8, no. 2, pp. 3966–3976, Apr. 2025.