Results 221 to 229 of about 42,263 (229)
Some of the next articles are maybe not open access.

Secure cryptographic functions via virtualization‐based outsourced computing

Concurrency Computation Practice and Experience, 2016
Hai Jin, Weiqi Dai, Weizhong Qiang
exaly  

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

IEEE Transactions on Information Forensics and Security, 2015
Michael Hitchens, Vijay Varadharajan
exaly  

A time-bound cryptographic key assignment scheme for access control in a hierarchy

IEEE Transactions on Knowledge and Data Engineering, 2002
exaly  

Home - About - Disclaimer - Privacy