![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Hofman Darra Duranti Luciana How Elissa
Publisher: MDPI
E-ISSN: 1999-4893|10|2|47-47
ISSN: 1999-4893
Source: Algorithms, Vol.10, Iss.2, 2017-04, pp. : 47-47
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
Symmetry, Vol. 7, Iss. 1, 2015-03 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Privacy-Enhancing Security Protocol in LTE Initial Attack
By Jang Uijin Lim Hyungmin Kim Hyungjoo
Symmetry, Vol. 6, Iss. 4, 2014-12 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Algorithms for Managing, Querying and Processing Big Data in Cloud Environments
Algorithms, Vol. 9, Iss. 1, 2016-02 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)