Login / Signup
Guarded dual authentication based DRM with resurgence dynamic encryption techniques.
Neha Agarwal
Ajay Rana
Jai Prakash Pandey
Published in:
Enterp. Inf. Syst. (2019)
Keyphrases
</>
digital rights management
dynamic environments
data encryption
encryption decryption
security analysis
identity authentication
trusted computing
public key cryptography
integrity verification
virtual private network