Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Security and privacy threats to volunteer computing
J.H. Abawajy
International Journal of Critical Infrastructures (IJCIS), 2008 Vol.4 No.3, pp.245 - 255
3 + 2 =

Thank you for your feedback.