Research Article

Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications

Table 15

Irregularity of the cryptography algorithm implementation techniques for .


321
-120.33