메뉴 건너뛰기




Volumn , Issue , 2010, Pages 540-541

Towards an anonymous access control and accountability scheme for cloud computing

Author keywords

[No Author keywords available]

Indexed keywords

CLOUD COMPUTING; CLOUD PROVIDERS; DATA ANONYMIZATION; GROUP SIGNATURES; WORK-IN-PROGRESS;

EID: 77957961711     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUD.2010.61     Document Type: Conference Paper
Times cited : (32)

References (2)
  • 1
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • ser. Lecture Notes in Computer Science, C. Boyd, Ed., Springer
    • R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," in ASIACRYPT, ser. Lecture Notes in Computer Science, C. Boyd, Ed., vol. 2248. Springer, 2001.
    • (2001) ASIACRYPT , vol.2248
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.