Enforcing security in cloud environment using elliptic curve cryptography and third party auditing

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
 

View

Download

Article ID: 9580
 
DOI: 10.14419/ijet.v7i1.7.9580




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.