共 50 条
- [1] Security Policy Checking in Distributed SDN based Clouds 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 19 - 27
- [2] A Novelty Approach for Checking Consistency of Security Policy 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 319 - +
- [4] Cloud data integrity checking with an identity-based auditing mechanism from RSA FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 85 - 91
- [5] An identity-based security mechanism for P2P VoIP 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 481 - +
- [6] Identity-based cryptography for grid security FIRST INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2005, : 395 - 404
- [8] Security of identity-based broadcast encryption Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
- [9] Survey of security on identity-based cryptography Jisuanji Yanjiu yu Fazhan, 2009, 9 (1537-1548):
- [10] On the security of an identity-based signature scheme Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):