Research Article

Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing

Figure 11

The working flow of (a) software encryption and (b) hardware encryption.
(a)
(b)