Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             10 results found
no title author magazine year volume issue page(s) type
1 A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing Qin, Zhen
2017
54 P1 p. 55-60
article
2 A two-party privacy preserving set intersection protocol against malicious users in cloud computing Cao, Xuefei
2017
54 P1 p. 41-45
article
3 Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens Han, Gang
2017
54 P1 p. 20-28
article
4 Cloud computing security and privacy: Standards and regulations Yu, Yong
2017
54 P1 p. 1-2
article
5 Identity-based provable data possession revisited: Security analysis and generic construction Liu, Hongyu
2017
54 P1 p. 10-19
article
6 Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment Odelu, Vanga
2017
54 P1 p. 3-9
article
7 Prelim 3 Editorial board 2017
54 P1 p. iii
article
8 Provable data transfer from provable data possession and deletion in cloud storage Xue, Liang
2017
54 P1 p. 46-54
article
9 SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing Ren, Wei
2017
54 P1 p. 29-35
article
10 Verifiable delegated quantum computation with χ-type entangled states Tan, Xiaoqing
2017
54 P1 p. 36-40
article
                             10 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands