Tags
rbac — access control — information security
logical implication – propositional calculus –
random keying technique— memetics— bio-inspire
clustering protocol — firefly algorithm — leac
workflow — workflow management systems— tempor
See more