Login / Signup
Cryptographic Techniques for Data Processing.
Shantanu Sharma
Sharad Mehrotra
Published in:
COMAD/CODS (2022)
Keyphrases
</>
security properties
data processing
security protocols
computer systems
data management
data analysis
data acquisition
high speed
stream processing
data warehouse
expert systems
data mining
database
decision making
artificial intelligence
smart card
information retrieval
neural network