Sign in

Application of Polar Code-Based Scheme in Cloud Secure Storage.

Zhe LiYiliang HanYu Li
Published in: ICPCSEE (1) (2020)
Keyphrases
  • protection scheme
  • rotation invariant
  • public key encryption
  • cloud computing
  • wireless networks
  • fourier transform
  • computing environments
  • storage requirements