Internet of Things Protection and Encryption: A Survey.
Ghassan SamaraRuzayn QuaddouraMooad Imad Al-ShaloutKhaled AL-QawasmiGhadeer Al BesaniPublished in: CoRR (2022)
Keyphrases
- data protection
- data confidentiality
- key technologies
- mobile devices
- privacy protection
- protection scheme
- physical world
- information security
- data security
- sensitive information
- sensitive data
- encryption scheme
- encryption algorithms
- digital signature
- encryption algorithm
- encryption decryption
- personal data
- image encryption
- security properties
- key management
- secret key
- information hiding
- intrusion detection
- access control