Login / Signup
Bring-your-own-encryption: How far are we?
Vishnu Kumar
Iti Sharma
Published in:
ICIIS (2016)
Keyphrases
</>
encryption scheme
image encryption
encryption algorithms
web applications
easy to follow
key exchange
key management
website
operating system
public key cryptography
database
neural network