Login / Signup
A hybrid encryption method handling big data vulnerabilities.
G. Priyanka
Anisha M. Lal
Published in:
Int. J. Cloud Comput. (2019)
Keyphrases
</>
big data
database
data sets
data mining
information technology
xml documents
parallel processing