Author: Hofman Darra Duranti Luciana How Elissa
Publisher: MDPI
E-ISSN: 1999-4893|10|2|47-47
ISSN: 1999-4893
Source: Algorithms, Vol.10, Iss.2, 2017-04, pp. : 47-47
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Study on User Authority Management for Safe Data Protection in Cloud Computing Environments
Symmetry, Vol. 7, Iss. 1, 2015-03 ,pp. :
Privacy-Enhancing Security Protocol in LTE Initial Attack
By Jang Uijin Lim Hyungmin Kim Hyungjoo
Symmetry, Vol. 6, Iss. 4, 2014-12 ,pp. :
Algorithms for Managing, Querying and Processing Big Data in Cloud Environments
Algorithms, Vol. 9, Iss. 1, 2016-02 ,pp. :