Results 191 to 200 of about 6,594 (201)
Some of the next articles are maybe not open access.

Cost-effective secure E-health cloud system using identity based cryptographic techniques

Future Generation Computer Systems, 2017
Xu An Wang, Fatos Xhafa
exaly  

Charm: a framework for rapidly prototyping cryptosystems

Journal of Cryptographic Engineering, 2013
Matthew Green
exaly  

Secure cryptographic functions via virtualization‐based outsourced computing

Concurrency Computation Practice and Experience, 2016
Hai Jin, Weiqi Dai, Weizhong Qiang
exaly  

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

IEEE Transactions on Information Forensics and Security, 2015
Michael Hitchens, Vijay Varadharajan
exaly  

Home - About - Disclaimer - Privacy