Fig. 2From: Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithmIBFA for transportation applicationsBack to article page