- Design and implementation of a secure cloud-based personal health record system using ciphertext-policy attribute-based encryption
- Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes
- Designated verifier ring signature and ring signcryption
- On the security of two multi-use CCA-secure proxy re-encryption schemes
- Activity clustering for anomaly detection
- Smart wireless sensor networks and biometric authentication for real time traffic light junctions management
16 September 2013
Special issue: "Advances in Secure and Trusted Cloud Computing and Distributed Data Storage"
International Journal of Intelligent Information and Database Systems 7(5) 2013
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment