• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication.

Duisen GulsezimSeiitkaliyeva ZhansayaAbdul RazaqueYestayeva RaminaFathi H. AmsaadMuder AlmianiRaouf M. GandaAhmed Oun
Published in: IoTSMS (2019)
Keyphrases
  • data sources
  • high quality
  • sensor data
  • computational complexity
  • data quality
  • mobile devices
  • smart card
  • spatial domain
  • key management