Research Article

Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing

Figure 3

Working flow of ACSA.