Return to Article Details Analysis of cryptographic authentication and manipulation detection methods for big data Download Download PDF