Login / Signup
Application of Polar Code-Based Scheme in Cloud Secure Storage.
Zhe Li
Yiliang Han
Yu Li
Published in:
ICPCSEE (1) (2020)
Keyphrases
</>
protection scheme
rotation invariant
public key encryption
cloud computing
wireless networks
fourier transform
computing environments
storage requirements