Author:Emdad Ahmed
KeyphrasesAsymmetric Key, business process, Ciphertext, Cloud Computing, digital signature2, evaluation strategies, metrics, performance indicators, Plaintext, private key, public key2, RSA2, Security, SHA, Symmetric key, workflow, Workflow Management Systems. |