Release Time:2019-03-12 Hits:
Indexed by: Journal Article
Date of Publication: 2017-01-01
Journal: Security & Communication Networks
Volume: 9
Issue: 18
Page Number: 6351-6364
Prev One:Efficient key generation leveraging channel reciprocity and balanced gray code
Next One:Hierarchical enhanced remote data possession checking in cloud storage