Internet of Things Protection and Encryption: A Survey.
Ghassan SamaraRuzayn QuaddouraMooad Imad Al-ShaloutKhaled AL-QawasmiGhadeer Al BesaniPublished in: ACIT (2021)
Keyphrases
- data protection
- data confidentiality
- information security
- mobile devices
- key technologies
- privacy protection
- encryption algorithms
- data encryption
- protection scheme
- secret key
- encryption scheme
- data quality
- sensitive data
- data security
- information hiding
- encryption decryption
- security level
- encryption algorithm
- physical world
- mobile computing
- big data
- key exchange
- random number
- key management
- sensitive information