Author:
Huang Jheng-jia,Lu Pei-chun,Juang Wen-shenq,Fan Chun-i,Lin Zheng-yang,Lin Chun-hung
Publisher
Springer Science and Business Media LLC
Reference16 articles.
1. Delettre C, Boudaoud K, Riveill M. Cloud computing, security and data concealment [C]//Proceedings of 2011 IEEE Symposium on Computers and Communications (ISCC). Piscataway, USA: IEEE, 2011: 424–431.
2. Chen D, Zhao H. Data security and privacy protection issues in cloud computing [C]//Proceedings of 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE). Piscataway, USA: IEEE, 2009: 647–651.
3. Jang E, Koh B, Choi Y. An authentication mechanism of digital contents in pervasive computing environment [C]//Proceedings of 2008 International Conference on Information Security and Assurance (ISA). Piscataway, USA: IEEE, 2008: 527–533.
4. Hartung F, Ramme F. Digital rights management and watermarking of multimedia content for mcommerce applications [J]. Communications Magazine, IEEE, 2000, 38(11): 78–84.
5. Ei Aimani L, Raekow Y. Reselling digital content [C]//Proceedings of ARES’10 International Conference on Availability, Reliability and Security. Piscataway, USA: IEEE, 2010: 391–396.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献