Confidential Greedy Graph Algorithm
International Journal of Electronics and Telecommunications(2018)
Key words
cryptography,fully homomorphic encryption,confidential graph algorithm,cloud computing
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined