1. Cryptanalysis of dual RSA;Peng;Design Codes Cryptography,2016
2. Maximizing small root bounds by linearization and applications to small secret exponent RSA;Herrmann,2010
3. A survey on resolving security issues in SaaS through software-defined networks;Shyam;International Journal of Grid and Utility Computing,2021
4. KeyPIn–mitigating the free rider problem in the distributed Cloud based on key, participation, and incentive;Pal;Journal of Cloud Computing,2022
5. Secure data group sharing and dissemination with attribute and time conditions in public Cloud;Huang;IEEE Transactions on Services Computing,2021