Login / Signup
Data Security Protocol with Blind Factor in Cloud Environment.
Ping Zhang
Huanhuan Chi
Jiechang Wang
Youlin Shang
Published in:
Inf. (2021)
Keyphrases
</>
data sets
data collection
computer systems
data analysis
data mining techniques
data processing
security protocols
databases
information systems
high dimensional data
high dimensional
end users
data management
cost effective
automated design