Return to Article Details
A SURVEY OF APPLIED APPROACHES FOR SOFTWARE ENCRYPTION OF DATA IN DIFFERENT OPERATING SYSTEMS
Download
Download PDF