Login / Signup

Secure Wipe Out in BYOD Environment.

Poorva TiwariC. S. SkandaU. SanjanaS. ArunaPrasad B. Honnavalli
Published in: IWBIS (2020)
Keyphrases
  • environmental conditions
  • real time
  • mobile robot
  • neural network
  • data mining
  • social networks
  • e learning
  • security requirements
  • security analysis
  • standard model
  • data encryption