Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
The advantages and principles of the
Data deduplication is one of important data compression techniques for eliminating duplicate copies ..
Convergent encryption, also known as content hash keying, is a cryptosystem that produces identical ..
In past decades, significant attention has been
devoted to the task allocation and load balancing ..
Ciphertext-policy attribute-based encryption
(CP-ABE) has been a preferred encryption technology t..
Following a surgical procedure, patients are
monitored in an ICU until physically stable, after wh..
Attribute-based encryption (ABE) is an advanced encryption technology where the privacy of receivers..
AbstractIn Cipher text Policy
Attribute Based Encryption (CP-ABE)a previously defined association b..
In Cipher text Policy
Attribute Based Encryption (CP-ABE)a previously defined associati..
ABSTRACT Cloud Computing is a Model for enabling
Convenient, on-demand netw..
Cipher text-policy attribute-based encryption (CP-ABE) is a very promising encryption technique for ..
Online auctions have effectively created a large marketplace for participants to bid and sell produc..
Cloud computing refers to the practice of transitioning computer services such as computation or dat..
Allocating service capacities in cloud computing
is based on the assumption that they are unlimited..
We motivate and present two designs for the composition of the authentication protocol, Kerberos, an..