Release Time:2019-03-12 Hits:
Indexed by: Conference Paper
Date of Publication: 2017-01-01
Page Number: 242-249
Prev One:Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage
Next One:Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage