Login / Signup

Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication.

Duisen GulsezimSeiitkaliyeva ZhansayaAbdul RazaqueYestayeva RaminaFathi H. AmsaadMuder AlmianiRaouf M. GandaAhmed Oun
Published in: IoTSMS (2019)
Keyphrases
  • data sources
  • high quality
  • sensor data
  • computational complexity
  • data quality
  • mobile devices
  • smart card
  • spatial domain
  • key management