Author:
Hsiao Liang-Sheng,Tsai Kun-Lin,Liu Jung-Chun,Leu Fang-Yie,Lu Yu-Syuan,Lin I-Long
Funder
Ministry of Science and Technology, Taiwan
Publisher
Springer Science and Business Media LLC
Reference45 articles.
1. Amazon. (2022). Protecting data using client-side encryption. AWS document. https://docs.aws.amazon.com/AmazonS3/latest/userguide/UsingClientSideEncryption.html. Accessed on 26 May 2022.
2. Anisetti, M., Ardagna, C. A., Bena, N., & Bondaruc, R. (2021). Towards an assurance framework for edge and IoT systems. IEEE International Conference on Edge Computing (EDGE), 41–43. https://doi.org/10.1109/EDGE53862.2021.00015
3. Best practices for using Azure Key Vault, Microsoft Document. (2022). https://docs.microsoft.com/zh-tw/azure/key-vault/general/security-features. Accessed on 25 Jun 2022.
4. Cantali, G., Ermis, O., Ufuk Çaglayan, M., & Ersoy, C. (2019). Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems. ACM Transactions on Privacy and Security, 22, 20–4.
5. Cryptographically Secure Pseudorandom Number Generator. (2022). Wikipedia. https://en.wikipedia.org/wiki/Pseudorandom_number_generator. Accessed on 10 Jul 2022.