Login / Signup
Implementing quantum cryptography algorithms for data security.
Otilia Cangea
Carmen-Silvia Oprina
Mihai-Octavian Dima
Published in:
ECAI (2016)
Keyphrases
</>
data security
databases
peer to peer
intrusion detection
data mining algorithms
information security
data centric