1. Multi-cloud data management using shamir's secret sharing and quantum byzantine agreement schemes;AlZain;Int. J. Cloud Appl. Comput. (IJCAC),2015
2. Secure Computer Systems: Mathematical Foundations;Bell,1973
3. Ciphertext-policy attribute-based encryption;Bethencourt,2007
4. Network Flow Analysis for Detection and Mitigation of Fraudulent Resource Consumption (Frc) Attacks in Multimedia Cloud Computing, Multimedia Tools and Applications;Bhushan,2017
5. Collusion resistant broadcast encryption with short ciphertexts and private keys;Boneh,2005