Login / Signup
Securing Data Transfer in IoT Employing an Integrated Approach of Cryptography & Steganography.
Ria Das
Punyasha Chatterjee
Published in:
HP3C (2017)
Keyphrases
</>
data transfer
information security
data access
data flow
data transmission
parallel computers
information systems
management system
web access
data delivery
cloud computing
file system
intrusion detection
smart card
data management
data hiding
database applications
data analysis
information hiding
real time