Login / Signup

Distributed computing framework in security: Case study of encryption method.

Shuaiyi BuShuxin YangHaoming Ji
Published in: ICITST (2017)
Keyphrases
  • distributed computing
  • case study
  • data mining
  • machine learning
  • information systems
  • multimedia
  • response time
  • access control
  • geographically distributed