From post

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.

, , , и . INTRUST, том 9473 из Lecture Notes in Computer Science, стр. 127-136. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage., , , и . INTRUST, том 9473 из Lecture Notes in Computer Science, стр. 127-136. Springer, (2014)