Determining the Security Standards of Different Crypto Algorithms | IEEE Conference Publication | IEEE Xplore