Periodicals of Engineering and Natural Sciences, PEN
Return to Article Details
A model of cryptographic network protection when using distributed big data arrays
Download
Download PDF