Login / Signup

A hybrid encryption method handling big data vulnerabilities.

G. PriyankaAnisha M. Lal
Published in: Int. J. Cloud Comput. (2019)
Keyphrases
  • big data
  • database
  • data sets
  • data mining
  • information technology
  • xml documents
  • parallel processing