Periodicals of Engineering and Natural Sciences, PEN
Return to Article Details A model of cryptographic network protection when using distributed big data arrays Download Download PDF