Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Mathematical Model of Network Center Data Hierarchical Encryption Based on Decentralization
In the era of rapid development of information, information has brought us a lot of convenience, but this is also a double-edged sword. User information leakage, network center database data tampering and othe...