Author:
Nidhin D.,Praveen I.,Praveen K.
Reference10 articles.
1. Zhou L, Varadharajan V, Hitchens M (2011) Enforcing role-based access control for secure data storage in the cloud. Comput J, 54(10):1675–1687
2. Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. Inf Forensics Secur IEEE Trans 8(12):1947–1960
3. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58
4. Duursma IM, Kiyavash N (2005) The vector decomposition problem for elliptic and hyperelliptic curves. IACR Cryptology ePrint Arch 31
5. Galbraith SD, Verheul ER (2008) An analysis of the vector decomposition problem. In: Public key cryptography—PKC 2008. Springer, Heidelberg, pp 308–327
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献