Data protection: Combining fragmentation, encryption, and dispersion | IEEE Conference Publication | IEEE Xplore