Login / Signup
An Analysis of Different Cryptocraphy Techniques and the Role of Coding and Information Theories in Overcoming Security Threats.
Mohammed Shakeel
A. Sirisha
Ankita Joshi
R. Ushasree
M. Vaishnavi
Devvret Verma
Published in:
IC3I (2022)
Keyphrases
</>
security threats
real time
data sets
information sharing
sensor networks
operating system