[1]
M. V. N. P. P. V. N., “Securing Hadoop using OAuth 2.0 and Real Time Encryption Algorithm”, IJRITCC, vol. 3, no. 7, pp. 4382–4387, Jul. 2015.