Hits:
Indexed by:会议论文
Date of Publication:2017-01-01
Page Number:242-249
Pre One:Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage
Next One:Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage