Security and privacy threats to volunteer computing

J.H. Abawajy
  • International Journal of Critical Infrastructures, January 2008, Inderscience Publishers
  • DOI: 10.1504/ijcis.2008.017439

The authors haven't finished explaining this publication. If you are the author, sign in to claim or explain your work.

Read Publication

http://dx.doi.org/10.1504/ijcis.2008.017439

The following have contributed to this page: Professor Jemal Abawajy