Login / Signup
Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments.
Judy Flavia B
Balika J. Chelliah
Published in:
Comput. Secur. (2023)
Keyphrases
</>
data security
fuzzy logic
encryption decryption
access control
real world
decision making
data centric
data privacy
expert systems
data management
data confidentiality
data sets
cloud computing
third party
privacy preserving data mining