Login / Signup

An Analysis of Different Cryptocraphy Techniques and the Role of Coding and Information Theories in Overcoming Security Threats.

Mohammed ShakeelA. SirishaAnkita JoshiR. UshasreeM. VaishnaviDevvret Verma
Published in: IC3I (2022)
Keyphrases
  • security threats
  • real time
  • data sets
  • information sharing
  • sensor networks
  • operating system