Author:
Eltayesh Faryed,Bentahar Jamal,Mizouni Rabeb,Otrok Hadi,Shakshuki Elhadi
Publisher
Springer Science and Business Media LLC
Reference33 articles.
1. AlShahwan F, Faisal M, Ansa G (2016) Security framework for restful mobile cloud computing web services. J Ambient Intell Hum Comput 7(5):649–659
2. An B, Tambe M, Ordonez F, Shieh EA, Kiekintveld C (2011) Refinement of strong Stackelberg equilibria in security games. In: AAAI
3. Chen X, Li J, Weng J, Ma J, Lou W (2014) Verifiable computation over large database with incremental updates. In: European symposium on research in Computer Security. Springer, Berlin, pp 148–162
4. Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556
5. Devanbu P, Gertz M, Martel C, Stubblebine SG (2002) Authentic third-party data publication. In: Data and application security. Springer, Berlin, pp 101–112
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献