Login / Signup
A secure and efficient file protecting system based on SHA3 and parallel AES.
Xiongwei Fei
Kenli Li
Wangdong Yang
Keqin Li
Published in:
Parallel Comput. (2016)
Keyphrases
</>
highly efficient
access control
database
cryptographic algorithms
satisfiability testing
database systems
cost effective
parallel processing
parallel computing
parallel architectures
unauthorized access