Login / Signup
Distributed computing framework in security: Case study of encryption method.
Shuaiyi Bu
Shuxin Yang
Haoming Ji
Published in:
ICITST (2017)
Keyphrases
</>
distributed computing
case study
data mining
machine learning
information systems
multimedia
response time
access control
geographically distributed