My interview in Network Computing on IoT, encryption back doors, steganography, security standards and biometrics.
You must be logged in to post a comment.
To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Learn More)