Login / Signup

Bring-your-own-encryption: How far are we?

Vishnu KumarIti Sharma
Published in: ICIIS (2016)
Keyphrases
  • encryption scheme
  • image encryption
  • encryption algorithms
  • web applications
  • easy to follow
  • key exchange
  • key management
  • website
  • operating system
  • public key cryptography
  • database
  • neural network