![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Lim JongBeom Gil Joon-Min Yu HeonChang
Publisher: MDPI
E-ISSN: 2073-8994|10|1|30-30
ISSN: 2073-8994
Source: Symmetry, Vol.10, Iss.1, 2018-01, pp. : 30-30
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
Symmetry, Vol. 7, Iss. 1, 2015-03 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Scenario-Based Digital Forensics Challenges in Cloud Computing
By Miranda Lopez Erik Moon Seo Yeon Park Jong Hyuk
Symmetry, Vol. 8, Iss. 10, 2016-10 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Privacy-Enhancing Security Protocol in LTE Initial Attack
By Jang Uijin Lim Hyungmin Kim Hyungjoo
Symmetry, Vol. 6, Iss. 4, 2014-12 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Efficient Location of Resources in Cylindrical Networks
By Carreño José Juan Martínez José Antonio Puertas María Luz
Symmetry, Vol. 10, Iss. 1, 2018-01 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce
By Hwang Ren-Junn Lai Chih-Hua
Symmetry, Vol. 7, Iss. 2, 2015-04 ,pp. :