Login / Signup

A comparison on type-II fuzzy logic based data encryption techniques in the Internet of Things.

Neeraj ChandnaniKirti Verma
Published in: J. Intell. Fuzzy Syst. (2023)
Keyphrases
  • type ii
  • data encryption
  • type i error
  • model selection
  • database applications
  • security requirements
  • encryption algorithm
  • data confidentiality