何德彪
开通时间:..
最后更新时间:..
点击次数:
发表刊物:IEEE Transactions on Information Forensics and Security , vol. 10, no. 12, pp. 1681-2691, 2015
合写作者: Xinyi Huang, Baowen Xu, Sherali Zeadally,Debiao He
论文编号:6
是否译文:否
上一条:Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud
下一条:Enhanced three-factor security protocol for USB consumer storage devices