Embedding of MRC in TM to increase the security for IoT technologies.
Joy Iong-Zong ChenDen Ji ChuangPublished in: iCAST (2017)
Keyphrases
- security problems
- management system
- key management
- security requirements
- information security
- information processing systems
- cloud computing
- intrusion detection
- computing technologies
- network services
- identity management
- document images
- security issues
- information systems
- security and privacy issues
- security mechanisms
- wireless sensor networks
- intellectual property protection
- smart objects
- data hiding
- geospatial information
- emerging technologies
- statistical databases
- communication systems
- network security
- computer networks
- access control
- mobile devices