Login / Signup
Fast hash-based high secure hiding technique for digital data security.
Shubham Shrimali
Aadarsh Kumar
John Singh K
Published in:
Electron. Gov. an Int. J. (2020)
Keyphrases
</>
data security
access control
data management
data confidentiality
data centric
data privacy
data integrity
information security
third party
databases
web services
end users
business processes
privacy preserving data mining