Login / Signup

Implementing quantum cryptography algorithms for data security.

Otilia CangeaCarmen-Silvia OprinaMihai-Octavian Dima
Published in: ECAI (2016)
Keyphrases
  • data security
  • databases
  • peer to peer
  • intrusion detection
  • data mining algorithms
  • information security
  • data centric