A review of data security and cryptographic techniques in IoT based devices.
Ghulam MustafaRehan AshrafMuhammad Ayzed MirzaAbid Jamil MuhammadPublished in: ICFNDS (2018)
Keyphrases
- data security
- encryption decryption
- access control
- data management
- data centric
- data privacy
- cloud computing
- smart card
- information security
- data integrity
- mobile devices
- key management
- management system
- data sets
- data access
- data sharing
- privacy preserving data mining
- relational databases
- information systems
- data mining