IJST volume 12, issue 48, P11-4 2019 DOI: 10.17485/ijst/2019/v12i48/149385 View full text
Rajkumar N, Janhavi V, Rajendra M.A.B.

Abstract: Objective: This study analyses out of exchanging security information. There is a strong requirement for access to various concentrations of delicate information at the edge; however, there is a greater danger than the key business setting at that place. Methods: This study explores the demands, technologies, and methods of threat mitigation to safely share information with the tactical user while preserving data and information systems from intruders and malware. Findings/ application: The new cryptography po…

expand abstract