Author:
Ullah Shamsher,Hussain Muhammad Tanveer,Yousaf Mahwish
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference49 articles.
1. Al-Dahhan RR, Shi Q, Lee GM, Kifayat K (2019) Survey on revocation in ciphertext-policy attribute-based encryption. Sens Multidiscipl Digit Publish Inst 19(7):1–22
2. Anoop M (2007) Elliptic curve cryptography: An implementation tutorial, Tata Elxsi Ltd
3. Armbrust M, Fox A, et al. (2010) A view of cloud computing. Commun ACM 53(4):50–58
4. Aymerich FM, Fenu G, Surcis S (2008) An approach to a cloud computing network, Applications of digital information and web technologies, First international conference on the ICADIWT 2008, IEEE, pp 113–118
5. Baek J, Steinfeld R, Zheng Y (2002) Formal proofs for the security of signcryption. International Workshop on Public Key Cryptography 2274:80–98. Springer
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献