GUILT 发表于 2025-3-25 03:22:04

http://reply.papertrans.cn/16/1501/150058/150058_21.png

Crayon 发表于 2025-3-25 08:16:46

https://doi.org/10.1007/0-387-32773-8trol) model which is considered as one of the most developed access control security models, to improve the highest degree of security in a concrete e-learning scenario for educational purpose, and to prove how the expressive power and flexibility of this model work. The proposed approach is impleme

取回 发表于 2025-3-25 11:55:45

http://reply.papertrans.cn/16/1501/150058/150058_23.png

Devastate 发表于 2025-3-25 19:48:26

Advances in Ubiquitous Networking978-981-287-990-5Series ISSN 1876-1100 Series E-ISSN 1876-1119

比喻好 发表于 2025-3-25 21:08:30

http://reply.papertrans.cn/16/1501/150058/150058_25.png

暗语 发表于 2025-3-26 01:58:07

http://reply.papertrans.cn/16/1501/150058/150058_26.png

矿石 发表于 2025-3-26 08:08:44

https://doi.org/10.1007/978-981-287-990-5distributed ambient intelligence; context-awareness; cloud computing; wearable devices; future mobile ne

胖人手艺好 发表于 2025-3-26 10:33:58

http://reply.papertrans.cn/16/1501/150058/150058_28.png

glamor 发表于 2025-3-26 16:36:30

Gary Lock,Brian Leigh MolyneauxThis paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.

ARCH 发表于 2025-3-26 17:29:00

Applying Encryption Algorithm for Data Security in Cloud StorageThis paper proposes a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Advances in Ubiquitous Networking; Proceedings of the U Essaïd Sabir,Hicham Medromi,Mohamed Sadik Conference proceedings 2016 Springer Scie