Author: Lim JongBeom Gil Joon-Min Yu HeonChang
Publisher: MDPI
E-ISSN: 2073-8994|10|1|30-30
ISSN: 2073-8994
Source: Symmetry, Vol.10, Iss.1, 2018-01, pp. : 30-30
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
Symmetry, Vol. 7, Iss. 1, 2015-03 ,pp. :
Scenario-Based Digital Forensics Challenges in Cloud Computing
By Miranda Lopez Erik Moon Seo Yeon Park Jong Hyuk
Symmetry, Vol. 8, Iss. 10, 2016-10 ,pp. :
Privacy-Enhancing Security Protocol in LTE Initial Attack
By Jang Uijin Lim Hyungmin Kim Hyungjoo
Symmetry, Vol. 6, Iss. 4, 2014-12 ,pp. :
Efficient Location of Resources in Cylindrical Networks
By Carreño José Juan Martínez José Antonio Puertas María Luz
Symmetry, Vol. 10, Iss. 1, 2018-01 ,pp. :
Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce
By Hwang Ren-Junn Lai Chih-Hua
Symmetry, Vol. 7, Iss. 2, 2015-04 ,pp. :