Author of the publication

Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services.

, , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A lower bound on the linear span of an FCSR., , , , and . IEEE Trans. Inf. Theory, 46 (2): 691-693 (2000)Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm., , , and . IEEE Access, (2020)DRM Cloud Architecture and Service Scenario for Content Protection., , and . J. Internet Serv. Inf. Secur., 3 (3/4): 94-105 (2013)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm., , , and . IEEE Access, (2019)New Block Recombination for Subquadratic Space Complexity Polynomial Multiplication Based on Overlap-Free Approach., , , and . IEEE Trans. Computers, 66 (8): 1396-1406 (2017)A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments., , , and . Secur. Commun. Networks, (2018)NoSQL Database Performance Diagnosis through System Call-level Introspection., , , , and . NOMS, page 1-9. IEEE, (2022)Comments on Ön the Polynomial Multiplication in Chebyshev Form"., , , and . IEEE Trans. Computers, 63 (12): 3162-3163 (2014)Certificate-Based Proxy Re-encryption for Public Cloud Storage., , , , and . IMIS, page 159-166. IEEE Computer Society, (2013)