Browsing Computing by Subject "Asymmetric Key Cryptography"
Now showing items 1-1 of 1
-
Comparison Analysis and Systematic Study on Secure Transmission of Data in the Cloud Using Steganographic Techniques and Cryptographic Algorithms
(2022)Data and information can be considered the most precious assets in electronic communication systems, but security has become a struggle in this competitive world. Cloud computing has emerged as the most exciting ...